3mp3r0rHow to make a local server have public IP to access anywhereFor the impatient ones, here are the two commands you need. For others, i recommend giving it a full read.Jul 17, 2021Jul 17, 2021
3mp3r0rHow to Change Lid Close Behavior in Ubuntu/LinuxSo i usually just close the lid of my laptop when i have to get out of my blanket or for any other reason to do a work which might take 5…Jan 30, 2021Jan 30, 2021
3mp3r0rVMware workstation file types -vmdk, vmx, vmsn etc.Whenever we download a virtual machine to install in VMware workstation, it consists of more than one file. But we only care about .vmdk…Jan 30, 2021Jan 30, 2021
3mp3r0rWiFi standards (802.11 series)We all are familiar with WiFi and probably use it on daily basis. If you have never come across the term ‘802.11’, then just keep reading…Dec 6, 2020Dec 6, 2020
3mp3r0rWhy we use #!/bin/bash (shebang) in scriptingI have been familiar with reading scripts for a some time now and started my bash scripting after watching Hackersploit’s playlist. But I…Dec 6, 2020Dec 6, 2020
3mp3r0rSSH vs SSL -Basic DifferencesIf you are related to computer science or cyber security in any way, you might have come across the 2 terms very often. But if do not know…Oct 19, 2020Oct 19, 2020
3mp3r0rTCP Handshake - Difference between FIN and RST flagWhile sending some information between two points in a connection-oriented network, some set of rules or protocols are followed.Sep 22, 2020Sep 22, 2020
3mp3r0rNMAP — All youIn this story i will tell you the ways nmap is used most most widely. You may call it a short summary on how to use NMAP for port…Aug 28, 2020Aug 28, 2020
3mp3r0rNew hereCTF write ups and many more cyber & infosec blogs coming in soon.Aug 24, 2020Aug 24, 2020