procfs

2024-08-27

procfs or the proc file system, is a virtual filesystem that provides information about the system. Its data can be accessed with typical filesystem ...

Read More

protocol

2024-08-27

In computer science, a protocol is an official procedure that governs how two entities communicate with each other, especially over a computer network ...

Read More

ps command

2024-08-27

The ps command shows information about actively running processes on a system. The ps command is common on Linux and Unix-like systems.

Read More

SSH identity key

2024-08-27

A SSH identity key is a private key used to authenticate users using the SSH protocol.

OpenSSH provides a command ssh-keygen to create identity keys.

Read More

ssh-keygen

2024-08-27

ssh-keygen is a command provided by OpenSSH to create identity keys.

Read More

xmrig

2024-08-27

XMRig is open-source cryptocurrency mining software. XMRig is often used by cybercriminals on compromised endpoints to monetize their unauthorized ...

Read More

blueboxingtollms-schiffman2024

2024-08-26

Cloud Security Podcast EP154 Mike Schiffman: from Blueboxing to LLMs via Network Security at Google

featuring Mike Schiffman

Cloud Security Podcast, ...

Read More

GitHub dorking - ssh keys

2024-08-26

GitHub dorking is using the search functionality of GitHub to find SSH keys. These are often committed to GitHub by mistake.

Read More

hash algorithm

2024-08-26

A hashing algorithm converts variable length data into a fixed-length set of bytes known as a hash.

Read More

hooks

2024-08-26

In a cybersecurity context, a hook is a technique that intercepts messages, events, or function calls between software components and subsequently ...

Read More