Tag: technology
-
+
+
+
+
+
+
The biggested misconception? Dr. Stilianos Vidalis Disclaimer: I have committed plagiarism to my heart’s content! “When the power of love overcomes the love for power, the world will know peace.” The Beginning… The evolution of computing Computer-centric era Computers have come a long way since the days they were invented.…
-
+
+
+
+
+
+
The 3rd lab provided by HTB, is called ‘Dancing’ and focuses more on ‘SMB’. One common way to transfer files across a network is through SMB (Server Message Block), a protocol mainly used on Windows systems to share files, printers, and other resources. SMB typically runs on TCP port 445,…
-
+
+
+
+
+
+
Fawn is the second lab that HTB gives us to learn from, it gives us an insight of what FTP is and how it could be used for compromising systems. First, lets understand what FTP even is! ʕっ•ᴥ•ʔっ What is FTP? “The File Transfer Protocol (FTP) is a standard communication…
-
+
+
+
+
+
+
# Setting Up Supabase Login Follow these steps to create your own login for Roky via supabase! ## Prerequisites 1. Flutter 2. Supabase Local Setup ## 1. Creating *Message* and *User* Tables using Flutter Assuming you have everything correctly installed, do the following: 1. Open Docker Desktop 2. Navigate to…
-
+
+
+
+
+
+
What HTB does is, after you complete the lab, they give you a quiz on what you’ve done. This is designed to help you understand and retain the information provided in the write-ups and video walkthroughs for future use. ʕᵔᴥᵔʔ It’s important to have an understanding of what has been…
-
+
+
+
+
+
+
Meow is one of the first vulnerable machines to PWN within the first tier. It gives us an understanding of the basics of penetration testing and how to get started when using HTB (Hack the box). Being the starting point, we will be exploring how we would use the workstation…
-
Session 4: Working with Data Main Topics Covered: SQL Examples from the Session 1. Using Logical Operators SELECT * FROM students WHERE age >= 18 AND name LIKE ‘J%’; SELECT * FROM training_exercises WHERE difficulty_level = ‘hard’ AND is_completed = false; 2. Sorting Data SELECT * FROM students ORDER BY…
-
Key Concepts and Demos 1. Introduction to Databases 2. Creating a Database Example: CREATE DATABASE intro_to_data; USE intro_to_data; 3. Creating Tables Example: CREATE TABLE equipment_maintenance ( equipment_id INT, maintenance_cost DECIMAL(10,2), description VARCHAR(255), is_operational BOOLEAN, last_maintenance_date DATE ); 4. Inserting Data Example: INSERT INTO equipment_maintenance VALUES (101, 2500.75, ‘Engine maintenance’, TRUE,…
-
1.2 Organisational Data 1.2.1 Types of Organisational Data 1.2.1.1 Traditional Data Traditional data is generated and maintained by organizations and includes: 1.2.1.2 Internet of Things (IoT) and Big Data IoT refers to a network of connected devices that collect and share data. With the growth of IoT, Big Data has…
-
1.1 The World of Cybersecurity 1.1.1 What Is Cybersecurity? Cybersecurity is the practice of protecting individuals, organizations, and governments from digital attacks by safeguarding networked systems and data from unauthorized use or harm. 1.1.2 Protecting Your Personal Data Personal data includes any information that can identify you and exists both…