Home
Rhett Coleman
Cancel

Secure in a Year: Protect Yourself from Digital Demise!

Program Overview Are you haunted by the chilling stories of innocent people falling prey to cybercriminals, losing their entire life savings, or having their private information exposed to the wor...

Burp Proxy

Burp Suite Overview Burp Suite is a software tool that helps cybersecurity experts and ethical hackers find security problems in websites and web applications. It works like a detective, looking fo...

Burp Suite Overall

Burp Suite Overview Burp Suite is a software tool that helps cybersecurity experts and ethical hackers find security problems in websites and web applications. It works like a detective, looking fo...

Secure in a Year: Week 1 - Use an Authenticator App

What is an Authenticator App? The Authenticator app works like a special lock for your online accounts, such as your bank account. When you sign in to your account, the website requires two things ...

Turning My Raspberry Pi 4 into a Media Center- The Ultimate Solution for Seamless Online Content Streaming

Overview Whether it’s binge-watching our favorite shows, enjoying movies, or exploring new web series, online platforms have revolutionized the way we consume entertainment. However, constantly mov...

Penetration Testing Methodologies

General Methodology In a practical sense, a smart methodology is one that aligns with the specific situation at hand. For example, it wouldn’t make sense to follow a methodology designed for testin...

Nmap Basics

Nmap Overview Nmap employs various techniques to scan and gather information about network hosts, such as IP addresses, open ports, running services, operating systems, and other related details. I...

Linux Permissions

Context Linux permissions are a fundamental aspect of the Linux file system that determine who can perform specific actions on files and directories. They serve to protect sensitive data and mainta...

Basic Linux Shortcuts and Commands

Use the following in a Linux Terminal Example root@linux1:~$ whoami Connection SSH The syntax to use SSH is very simple. We only need to provide two things: The IP address of the remote machin...