11 Articles in the category: Security

Stuxnet and the Birth of Cyber War - Byte.Yoga

Stuxnet and the Birth of Cyber War

Most people are aware of the horrors of nuclear war. However there is much less awareness of the civilisation-ending potential of cyber war. Stuxnet is one of the most famous and sophisticated pieces of malware...

bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity - Byte.Yoga

bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity

This page describes how to install bee-box, a virtual Linux installation containing bWAPP, which is a deliberately buggy web application to practice pentesting and other cyber security skills on. From the bWAPP website: ...

Introduction to the Iptables Firewall Program for Linux - Byte.Yoga

Introduction to the Iptables Firewall Program for Linux

This page gives a quick introduction to the Iptables firewall software for Linux. More details will follow later... 1. How Iptables Works. The term “iptables” may refer to either the software firewall which is integrated...

Basics of SQL Injection Attacks - Byte.Yoga

Basics of SQL Injection Attacks

SQL injection attacks are carried out by inserting SQL code into a field where user input is accepted. If the user input is not correctly handled, this can result in the code executing by the...

Learn Encryption Concepts with the Historic Caesar Cipher - Byte.Yoga

Learn Encryption Concepts with the Historic Caesar Cipher

This is the first type of "secret spy code" I learned as a child, from a book called "The Spy's Guidebook". Years later, I learned that it's called a Caesar Cipher — named after Julius...

An Introduction to Port Scanning with Nmap - Byte.Yoga

An Introduction to Port Scanning with Nmap

This video gives an introduction and demonstration of port scanning, using Nmap and Masscan on Kali Linux. I made the video as part of an assignment for my Cyber Security course. I'll write more...

Log4Shell – The Single Biggest Security Vulnerability Ever? - Byte.Yoga

Log4Shell – The Single Biggest Security Vulnerability Ever?

Log4Shell is a recently disclosed security vulnerability in a popular piece of software used for generating log files (including logging error messages), written in Java, known as Log4j. It's affected countless computers around the world...

Learn How to Hack Systems By Playing the Bandit Wargame - Byte.Yoga

Learn How to Hack Systems By Playing the Bandit Wargame


Difficulty
Interest
Education
Overall

You can play this game to learn the basics of the Unix / Linux terminal "shell" command prompt, and many other essential skills used in computer networking, including hacking. I'll write much more about this soon...

My Coding and Developer Portfolio - Byte.Yoga

My Coding and Developer Portfolio

This page began on 31 October, 2021 as a portfolio for my IT work, now that I'm back looking for IT work again. It was originally hosted on my Mathwiz maths tutoring website (before Byte...

Hardening Windows – How to Secure and Protect Windows - Byte.Yoga

Hardening Windows – How to Secure and Protect Windows

The main features are: Make a user account with only normal priveleges and not administrator ones, and use that account for your daily use. Only use the admin account when you are doing a lot of...

Nuclear Bomb Explosion Simulator - Byte.Yoga

Nuclear Bomb Explosion Simulator

The nuclear bomb simulator shows the three main dangers from a nuclear war - fireball, blast, and fallout. Try it out by typing the name of...