Overview of Linux crontab and task scheduling, including automated backups, user management, shell scripting, compressed archives, and recurring system tasks.
Category: Code
Linux: Group & User Management
Overview of Linux user and group management, including account creation, permissions, ownership, access control, and best practices for secure system administration.
Linux: Cracking Passwords
Explores Linux password cracking concepts, including hashing, shadow files, attack methods, and how ethical testing improves authentication security.
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
The NotPetya Cybersecurity Attack & Breach
Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.
Linux Exercise – File Permission
Explains Linux file permission concepts, including read, write, execute rights, ownership, and how proper permission management enhances system security.