We have been using arms for years on our cell phones, but is this the future of computing? Is the future? Yeah, this is the future. I could define arm as a complex, advanced and very light architecture this allows it to be used in small devices such as pi or smartphones. Apple M1 The new apple m1 is a total innovation, one of the most popular and popular computers using the 100% arm architecture, the process was difficult and some applications did not work at first but once it was adapted it made us all want to have a macbook again for its new chip created by apple.
Firefox has accompanied us for years, it is always there in each Linux distro we install and for a long time there was a rivalry as to whether Chrome or Firefox was better, but will it be the end of the Fox browser? From the ashes of Netscape We all remember the first war between browsers, the headache for web developers at that time when Microsoft and the now-defunct Netscape fought to the death for dominance of the web, the winner Microsoft, but before Netscape died he released his code so that was reborn from the ashes with another name Mozilla Firefox which until a few months ago was the 2 most used browser in the world and the main competition of Chrome that was not Chromium.
A question that we all ask ourselves when we start in cybersecurity is the operating system to use for many Kali Linux is the king in the best operating system for pentesting but there are a number of users who use Parrot OS, but which of the two operating systems is better, which one should you use, well I’ll answer this in this post. Kali Linux 🐉 Kali Linux as your page says it may be “The Most Advanced Penetration Testing Distribution”, Kali is a Linux distribution based on Debian, it has existed since March 2013, successor to BackTrack Linux and developed by the company Offesive Security.
Starting with the writeups, today we will launch the HackTheBox Archetype machine that belongs to the Starting Point group here the writeup. Enumeration Scan We’ll start with a simple port scan with nmap: kyb3r@cipher ~: nmap -sV -sC 10.10.10.27 Starting Nmap 7 ( https://nmap.org ) Nmap scan report for 10.10.10.27 Host is up (0.10s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows Server 2019 Standard 17763 microsoft-ds 1433/tcp open ms-sql-s Microsoft SQL Server 2017 14.
A debate that has always had the question of “What do you have to hide?” It has always been present when it comes to privacy on the internet, but how necessary is privacy? Basic I think we should start at the beginning by defining privacy. The Cambridge dictionary defines it as: “Someone’s right to keep their personal matters and relationships secret” In computing we can save personal data, when we access a site or upload something to the internet, this data is created many times from locations, photos, relationships with other people or dates of birth.
A bit illogical, right? The first post on my blog was the reason why I didn’t create any more distributions and today I am teaching you how to make a custom Arch Linux image. But do not create another Linux just modify Arch to your liking and keep it as an Arch.But more than one will use this to create another “distribution” (Please don’t). Then… But hey, we better start.