Tutorials and articles on topics outside of cyber security.

27 04, 2022

Python Socket Programming – Simple Bidirectional Communication

2022-04-27T01:22:40+00:00Wednesday, April 27, 2022|Categories: Code Snippets|Tags: , , |0 Comments

These two scripts (client and server) demonstrate a simple method to utilize the Python Sockets library for bi-directional communication.

1 03, 2022

Iterate Through Files and Generate File Hash (MD5 and SHA256) with Walrus Operator

2022-03-02T01:52:40+00:00Tuesday, March 1, 2022|Categories: Code Snippets, Digital Forensics|Tags: , , , , , |0 Comments

This code calculates either an MD5 and or SHA256 hash of a file and then returns one or more values.

26 01, 2022

A Vulnerability in pkexec Allows Privileged Program Execution (Privilege Escalation)

2022-01-26T20:12:32+00:00Wednesday, January 26, 2022|Categories: Cybersecurity News|Tags: , , , |0 Comments

Qualys security researchers have been able to independently verify the vulnerability, develop an exploit, and obtain full root privileges on default installations of Ubuntu, Debian, Fedora, and CentOS.

Go to Top