Login Register
Don't Miss Out On The Action!

Sign up for our newsletter and you'll be among the first to find out about new posts, tutorials, live streams, and exclusive content.

Rhyno Cybersecurity

From mitigating the risk of cyber-attacks to achieving compliance with industry regulations, we assess, implement, and manage cybersecurity for the growing enterprise.

Bwired Technologies

Cyber-first Managed IT Services and solutions that infuse security across your organization to reduce risk and empower your teams to focus on your business, not the technology behind it.

Videos

Watch the latest videos on cybersecurity, development, and technology. Stay informed with expert insights, tutorials, and industry updates.

No upcoming videos available. Subscribe to stay tune!

Latest Posts

I write about Cybersecurity, DevOps, and Technology. Don't forget to subscribe to my newsletter for the latest updates.

DEV Jan 08, 2025 | Comments: 0

Advanced Linux Server Access Management for YOUR Developers

Introduction Imagine you have a robust server infrastructure, and you want your talented web developers to collaborate seamlessly without compromising security. The best way to achieve this balance is through Secure Server Access Management. This guide provides a detailed, step-by-step approach to managing developer access securely, ensuring that your server …

DEV  |  AI Jan 04, 2025 | Comments: 0

I Built an AI Blog/Article TL;DR Summarizer. Here's How I Did It.

Introduction Welcome to the Two-Pass TL;DR Summarizer tutorial. This script condenses the content of a single webpage into a single-paragraph summary—stripping out bullet points, disclaimers, and enumerations. It harnesses the power of Ollama to run various local models (e.g., LLaMA, Qwen, Whiterabbit) and uses a two-pass approach to ensure the …

CYBER Dec 12, 2024 | Comments: 0

🎯 Subdomain Fuzzing with Quick Host Fuzzer

Welcome to the Quick Host Fuzzer tutorial! This guide will walk you through using the Quick Host Fuzzer to uncover subdomains effectively. This tool is designed to be simple, lightweight, and efficient, making it ideal for ethical hacking and penetration testing. You can find the tool on GitHub: Quick Host …

CYBER Dec 04, 2024 | Comments: 0

How to Use Chisel for Reverse Tunneling

Chisel is a fast TCP/UDP tunnel over HTTP, secured via SSH. It’s a simple tool often used for creating secure tunnels to forward ports or access internal networks from external systems. Chisel supports reverse tunneling, making it particularly useful for penetration testing, remote administration, and secure communications. Key Features Port …

DEV  |  AI Nov 28, 2024 | Comments: 0

NVIDIA GPU Passthrough to Debian VM on Proxmox

Overview This guide documents the complete process of setting up NVIDIA GPU passthrough to a Debian VM on Proxmox, including detailed troubleshooting steps and real error resolution. This is based on actual implementation experience with an RTX 3050 GPU. Initial Setup Verification (ProxMox) 1. Host System Requirements Check First, verify …

DEV Nov 23, 2024 | Comments: 0

Build a Public IP Checker in Django

This tutorial walks you through creating a Django web application that allows users to check their public IP address. It features a home page with a button and a dedicated page to display the user’s IP address. The project uses Bootstrap 5 for styling and FontAwesome for icons. Files and …