New repo for content. Fresh start.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

3.9 KiB


We are back.

Project updates

Some design changes (color, formating)
Add contact with GPG key

Update Public notes:
add gpg notes pages
add tcpdump notes page
add mutt notes page
add wireshark notes page

Launch Wallpapers:
Wallpaper of various projects. Going to publish more self-made wallpapers over time.

Draft version is online. Working on the format for now.
Note There is a draft version over at

Update MNTR:
Live version for testing purposes is online over at
Note This project is work in progress and not suited for production.


This week I Learned
Secret key in Authorization header vs. inside POST body # Similiar, since both auth creds end up in the HTTP request header
Linux | Stress test CPU:
# yes > /dev/null & # repeat this command multiple times or write a script
# killall yes # to stop it
Windows | check if port is open via Powershell:
Test-NetConnection <Host or IP> -port 22
Windows | tail but in Powershell:
gc random.log -wait
Windows | Create folder with all system control settings:
Create a folder and name it GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}


A free resource for digital security educators
Former Malware Distributor Kape Technologies Now Owns ExpressVPN, CyberGhost, Private Internet Access, Zenmate, and a Collection of VPN “Review” Websites
"How we built a truly Smart Office system based on Raspberry Pi"
Proton wins appeal in Swiss court over surveillance laws
Linux (In)security
Linux Network and Security Controls
Writing a Technical Book
How to Write a Technical Book
So You Want to Write a Technical Book
A different type of scam
some books
Reading off-topic:
How to Study: A Brief Guide


Firefox add-on that protects against fingerprinting (currently testing it):

Discuss here:

Git Tw Ma

{{% contact %}}