All Posts

  • Cloud Computers for Hacking

    Cloud Computers for Hacking

    Cloud computing has been around for a while now. There are offerings from many big tech companies and it’s very cheap, sometimes free, to get a cloud server up and running. In this article, we’ll look at the uses of these servers in the world of cybersecurity. Hosts But before we begin let’s review some…


  • One Year On Medium

    One Year On Medium

    It’s been a year since I published my first article on Medium, let’s see how things went. Goals When writing my first article, my aim was to inform readers about various cybersecurity topics. I wanted to explain how attacks worked, how to use different tools, and share my experience using these tools. All of my…


  • DNS Poisoning

    DNS Poisoning

    DNS poisoning is the act of intercepting DNS requests and sending spoofed responses. This can be done as most DNS requests are sent in plaintext, making it easy to intercept. These attacks are actually quite common as most routers use it censor adult websites on devices. In this article, we’ll go over ways to perform…


  • Kali vs Parrot vs Athena

    Kali vs Parrot vs Athena

    The operating system is an integral part of cybersecurity. Each one offers different tools and functions catering to different people. In this article, I will review some of the differences and my experiences with the OSs I’ve used. Kali Based on Debian, link here. Pros: Cons: Parrot Based on Debian, link here. Pros: Cons: Athena Based on…


  • Portmaster: Privacy Oriented Firewall

    Portmaster: Privacy Oriented Firewall

    Safing’s Portmaster is an open source firewall that allows users to monitor and block network activity. Its primary purpose is to protect privacy by blocking malicious connections from apps and hiding the computer’s IP address. In this article, I will go over my experiences with setting up and using Portmaster. Setup Installing Portmaster was simple, I…