New pages
- 22:26, 22 July 2024 Routing and Switching (hist | edit) [1,512 bytes] Duffsigpatch (talk | contribs) (Created page with "==Routes== Routes are the backbone for most of the internet. It is a system of costs that help manage where traffic is supposed to go. Even for many in computers, the whole internet itself seems like a hard target. This is an illusion. All it takes is for one computer to have a bad route or not be on the same page to mess up things. As one of my teachers put it, Pakistan made the mistake of blacklisting Youtube by black holing the domain. This works, but if you set the...") originally created as "Routing"
- 14:42, 5 June 2024 Signed Messages (hist | edit) [1,059 bytes] Duffsigpatch (talk | contribs) (Created page with "NOTE: This is a hypothetical to teach about digital signatures. You may download the verification here. It is preset to use the key to verify transmissions from me. Whenever I speak, I will sign a message with an accompanying signature. Only I can generate these signatures, so you will always know it is me. I will sign occasional messages here that way you may verify my particular information. My predictions are never wrong. Don't trust anybody but me and you will be re...")
- 23:23, 20 March 2024 Bash (hist | edit) [2,075 bytes] Duffsigpatch (talk | contribs) (Created page with "Bash")
- 23:23, 20 March 2024 Root and Sudo (hist | edit) [1,755 bytes] Duffsigpatch (talk | contribs) (Created page with "Root and Sudo")
- 22:41, 20 March 2024 Cybersecurity Terms Index (hist | edit) [153,109 bytes] Duffsigpatch (talk | contribs) (Created page with "==Security Plus== ;Advanced Persistent Threat (APT) : An APT is a type of cyber attack where an unauthorized user gains access to a network and remains undetected for an extended period, often to steal sensitive data. ;Attack vector : An attack vector is a method or pathway through which an attacker can gain unauthorized access to a network, device, or application. ;Attributes : Attributes refer to characteristics or properties that can be used to identify or describe so...") originally created as "Glossary"
- 21:00, 14 March 2024 Setting Up A Virtual Machine Hacking Lab (hist | edit) [5,553 bytes] Duffsigpatch (talk | contribs) (Created page with "Virtual Machines form the backbone of AWS and many other services in the industry, but that is not the point of this article. The point of this article is to help you set up a method for you to play around with hacking into things. You will need enough ram to run bo") originally created as "Setting Up A Virtual Machine"