Latest Articles
View Archives →-
Un-bypassable Windows Hardening for Content FilteringA multi-layered defense-in-depth guide to locking down Windows using Registry policies, DNS over HTTPS, and privilege management to block adult content.
10 min -
Calculating Global Import Costs for Industrial ProductsA step-by-step guide to calculating the total cost of importing industrial goods, including shipping, duties, and taxes, featuring a 50MWp PV module case study.
2 min -
Phishing Basics | TryHackMe Write-upComplete walkthrough for TryHackme room. Explore phishing techniques and tools for penetration testing.
4 min -
Why Your WWW Domain Shows Error 522 And How to Fix ItGetting an Error 522 Connection Timed Out on your www domain in Cloudflare Pages? Learn why this happens and how to fix it in under two minutes.
3 min -
How to Install n8n via Docker and Fix the 503 ErrorA step-by-step guide to self-hosting n8n using Docker Compose, including how to troubleshoot and fix common folder permission crashing errors.
3 min -
Burp Suite: Repeater | TryHackMe Write-upComplete walkthrough for Burp Suite: Repeater TryHackme room. Learn how to use Repeater to duplicate requests in Burp Suite.
6 min -
SQL Injection | TryHackMe Write-upComplete walkthrough for SQL Injection TryHackme room. Learn how to detect and exploit SQL Injection vulnerabilities
6 min -
Become a Hacker | TryHackMe Write-upComplete walktrough for Become a Hacker TryHackme room. Explore offensive security, the hacker mindset, and hack a web app to improve security!
3 min -
Command Injection | TryHackMe Write-upWalkthrough for Command Injection TryHackme room. Learn about a vulnerability allowing you to execute commands through a vulnerable app, and its remediations.
3 min -
Race Conditions | TryHackMe Write-upComplete walktrough for Race Conditions TryHackme room. Learn about race conditions and how they affect web application security.
6 min
View All Publications