procfs
2024-08-27
procfs or the proc file system, is a virtual filesystem that provides information about the system. Its data can be accessed with typical filesystem ...
Read More
protocol
2024-08-27
In computer science, a protocol is an official procedure that governs how two entities communicate with each other, especially over a computer network ...
Read More
ps command
2024-08-27
The ps command shows information about actively running processes on a system. The ps command is common on Linux and Unix-like systems.
Read More
SSH identity key
2024-08-27
A SSH identity key is a private key used to authenticate users using the SSH protocol.
OpenSSH provides a command ssh-keygen to create identity keys.
Read More
ssh-keygen
2024-08-27
ssh-keygen is a command provided by OpenSSH to create identity keys.
Read More
xmrig
2024-08-27
XMRig is open-source cryptocurrency mining software. XMRig is often used by cybercriminals on compromised endpoints to monetize their unauthorized ...
Read More
blueboxingtollms-schiffman2024
2024-08-26
Cloud Security Podcast EP154 Mike Schiffman: from Blueboxing to LLMs via Network Security at Google
featuring Mike Schiffman
Cloud Security Podcast, ...
Read More
GitHub dorking - ssh keys
2024-08-26
GitHub dorking is using the search functionality of GitHub to find SSH keys. These are often committed to GitHub by mistake.
Read More
hash algorithm
2024-08-26
A hashing algorithm converts variable length data into a fixed-length set of bytes known as a hash.
Read More
hooks
2024-08-26
In a cybersecurity context, a hook is a technique that intercepts messages, events, or function calls between software components and subsequently ...
Read More