Skip to main content

Weekly 21-45 | We are back

General

We are back.

Project updates

UpdateITTavern.com:
Some design changes (color, formating)
Add contact with GPG key

UpdatePublic notes:
add gpg notes pages
add tcpdump notes page
add mutt notes page
add wireshark notes page

LaunchWallpapers:
Wallpaper of various projects. Going to publish more self-made wallpapers over time.

UpdateSecuritymanual.org:
Draft version is online. Working on the format for now.
Note There is a draft version over at draft.securitymanual.org.

UpdateMNTR:
Live version for testing purposes is online over at status.itt.sh
Note This project is work in progress and not suited for production.

TwIL

This week I Learned
Web:
Secret key in Authorization header vs. inside POST body # Similiar, since both auth creds end up in the HTTP request header
Linux | Stress test CPU:
# yes > /dev/null & # repeat this command multiple times or write a script
# killall yes # to stop it
Windows | check if port is open via Powershell:
Test-NetConnection <Host or IP> -port 22
Windows | tail but in Powershell:
gc random.log -wait
Windows | Create folder with all system control settings:
Create a folder and name it GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Reading

Links:
A free resource for digital security educators
Former Malware Distributor Kape Technologies Now Owns ExpressVPN, CyberGhost, Private Internet Access, Zenmate, and a Collection of VPN “Review” Websites
"How we built a truly Smart Office system based on Raspberry Pi"
Proton wins appeal in Swiss court over surveillance laws
Linux (In)security
Linux Network and Security Controls
Writing a Technical Book
How to Write a Technical Book
So You Want to Write a Technical Book
A different type of scam
Books:
some books
Reading off-topic:
How to Study: A Brief Guide

Various

Firefox add-on that protects against fingerprinting (currently testing it):
Chameleon

Discuss here:

E-Mail hellofoo@ittafoovern.comcom