Overview of Linux user and group management, including account creation, permissions, ownership, access control, and best practices for secure system administration.
Category: Code
Linux: Cracking Passwords
Explores Linux password cracking concepts, including hashing, shadow files, attack methods, and how ethical testing improves authentication security.
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
The NotPetya Cybersecurity Attack & Breach
Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.
Linux Exercise – File Permission
Explains Linux file permission concepts, including read, write, execute rights, ownership, and how proper permission management enhances system security.