Tunkeutumistestaus 2024

Tunkeutumistestaus 2024

Learn to hack computers to protect your own. In the course, you will break into target computers.

Excellent feedback, reached 5.0 out of 5.

Final Lab for Linux Palvelimet 2024 Spring

Final Lab for Linux Palvelimet 2024 Spring

This is the evaluated lab exercise for Linux Server course. Student had an empty virtual Linux installation and free use of public Internet.

Course Linux palvelimet is in Finnish, so the rest of this page is in Finnish.

Linux Palvelimet 2024 alkukevät

Linux Palvelimet 2024 alkukevät

Learn to manage your own Linux server – in 8 weeks.

100% remote. Weekly video conference + a lot of individual work. Beginners welcome. Excellent feedback. In Finnish.

Information Security 2024 Spring

Information Security 2024 Spring

Data security course, in English as you asked.

Understand adversarial view on security. Recognize key concepts of security. Be able to safely practice hands-on with security tools.

Format Dates Calendar.Txt Style

Format Dates Calendar.Txt Style

Format your dates Calendar.txt style, everywhere! Like 2024-01-04 w01 Thu.

I printed every day from year 1700 to 2400, using Python 3, Go, PHP, Django templates and 'date'. Then I checked that results match.

day.strftime("%Y-%m-%d w%V %a") # Python
$date->format('Y-m-d \wW D') // PHP
date +"%Y-%m-%d w%V %a" # Linux 'date'
J-P Won My CTF

J-P Won My CTF

Jari-Pekka Ollikainen won my Capture the Flag. It was a hacking challenge, on the last day of my ethical hacking course. He was the first to break all eight challenges.

The game tested penetration testing skills. It included mapping the attack surface using port scanning and fuzzing, cracking password protected files and breaking web applications using multiple approaches.

J-P is also one of the authors of PhishSticks (video, git). Suffice to say: never connect an unknown USB device to your computer.

PGP - Send Encrypted and Signed Message - gpg

PGP - Send Encrypted and Signed Message - gpg

Send a secret message over untrusted Internet. Encryption prevents anyone from reading your message. Signing protects your message from modification. Public keys allow you to establish trust without meeting physically.

This article shows how you can use PGP encryption with 'gpg' tool. We'll simulate two users to make it easy to practice. PGP is well known, highly secure standard for encryption.

Alice will send a signed, encrypted message to Tero. This is the most obvious, basic use of PGP.


View all 2023 posts, total 23 posts.

View all 2022 posts, total 24 posts.

View all 2021 posts, total 40 posts.

View all 2020 posts, total 24 posts.

Visit old site 1998-2019 with 580+ posts and 3900+ comments.