Discover
Communities
Decks
Login
Discover
Communities
Decks
Buy perks
Login
Signup
35
alphydan
Available
Used
Resource Credits
71 Followers
10 Following
November 10, 2017
RSS feed
Posts
Blog
Posts
Comments
Communities
Wallet
Mute
alphydan
bitcoin
6y
What in the world is Bitcoin?
This post is a basic introduction to the technology behind Bitcoin. It is based on a talk I gave a few months ago. The audience was assumed to know very little about the technology. Professionally, I juggle
$ 0.000
3
2
alphydan
virtual-reality
6y
The end of the written language
"What should we call each other?", said Isobel. "Well, we could always start with Mrs Crawley and Lady Grantham", replied Violet. With that dialogue we are ushered into Downtown Abbey
$ 0.000
3
2
alphydan
teaching
7y
Teaching Cyber Security (Table of Contents)
This is the table of contents for a 17 part series on teaching cybersecurity to middle and high school students. Introduction to the shell Introduction, The challenge and introduction to the mission. Part
$ 0.000
2
alphydan
linux
7y
Teaching Cyber Security (Part 17)
This is the 17th post of a series for teaching cyber-security in a coding-club. Read [part 16] Putting it all together Combining it all In this unit we'll use what we have learnt in the previous units
$ 0.000
2
alphydan
linux
7y
Teaching Cyber Security (Part 16)
This is the 16th post of a series for teaching cyber-security in a coding-club. Read [part 15] Bash scripts The Shell By now you should be familiar with the operation of the shell (and the programs which
$ 0.000
3
1
alphydan
linux
7y
Teaching Cyber Security (Part 15)
This is the 15th post of a series for teaching cyber-security in a coding-club. Read [part 14]. Host & whois Information gathering When hackers want to attack a target they will have an initial phase
$ 0.000
2
alphydan
linux
7y
Teaching Cyber Security (Part 14)
This is the 14th post of a series for teaching cyber-security in a coding-club. Read [part 13]. Ping Pong on the World Wide Web Connecting to the internet In the first module you learnt many commands to
$ 0.000
2
alphydan
linux
7y
Teaching Cyber Security (Part 13)
This is the 13th post of a series for teaching cyber-security in a coding-club. Read [part 12] Overview Cowsay Let's install a new program called cowsay. Remember you can do that with: sudo apt install
$ 0.000
1
alphydan
linux
7y
Teaching Cyber Security (Part 12)
This is the 12th post of a series for teaching cyber-security in a coding-club. Read [part 11] Copying files I need the same file in different directories As we have learned, bash commands allow us to
$ 0.000
1
alphydan
linux
7y
Teaching Cyber Security (Part 11)
This is the 11th post of a series for teaching cyber-security in a coding-club. Read [part 10]. Pipes and security Pipes and dictionaries How would you guess a password? A lot of people use common words,
$ 0.000
1
alphydan
linux
7y
Teaching Cyber Security (Part 10)
This is the 10th post of a series for teaching cyber-security in a coding-club. Read [part 9]. Pipe and count Disk Usage In our mission we may have to inspect large files. For example creating a file full
$ 0.000
1
alphydan
linux
7y
Teaching Cyber Security (Part 9)
This is the 9th post of a series for teaching cyber-security in a coding-club. Read [part 8] Create directories and move files Creating directories We have a lot of files and folders on our home directory,
$ 0.000
2
alphydan
linux
7y
Teaching Cyber Security (Part 8)
This is the 8th post of a series for teaching cyber-security in a coding-club. Read [part 7] Seeing processes View all processes in a machine You should have done the following: sudo apt install htop which
$ 0.000
1
alphydan
linux
7y
Teaching Cyber Security (Part 7)
This is the 7th post of a series for teaching cyber-security in a coding-club. Read [part 6]. Hacking and protecting the secret server Our mission is to get inside this server and fix the security: In
$ 0.000
2
3
alphydan
cibersecurity
7y
Teaching Cyber Security (U2/P3)
This post has moved to:
$ 0.000
4
alphydan
cybersecurity
7y
Teaching Cyber Security (Unit2 - Part 1)
Hacking and protecting the secret server Our mission is to get inside this server and fix the security: In the previous unit, we learnt to interact with the shell, to send commands to the core of the computer.
$ 0.000
1
alphydan
cybersecurity
7y
Teaching Cyber Security (Part 6)
This is the 6th post of a series for teaching cyber-security in a coding-club. Read [part 5]. If you are teaching this course you can clone the files and directories to follow along. The files can be found
$ 0.000
4
2
alphydan
cybersecurity
7y
Teaching Cyber Security (Part 5)
This is the 5th post of a series for teaching cyber-security in a coding-club. Read [part 4] Listing hidden files The ls command ommited directories and files with a dot Aha! You are becoming a sharp-eyed
$ 0.000
5
1
alphydan
linux
7y
Teaching Cyber Security (Part 4)
This is the 4th post of a series for teaching cyber-security in a coding-club. Read [part 3] Where we are currently? Remember that we said our server in Holland won't have a mouse, a keyboard or a screen.
$ 0.000
2
1
alphydan
linux
7y
Teaching Cyber Security (Part 3)
This is the 3rd post of a series for teaching cyber-security in a coding-club. Read [part 2] Introduction The shell is sometimes called terminal, command line interface or CLI. It's the place where you
$ 0.000
4
Follow, be first to know
Nothing found in posts.
Center