Blog

15 Results / Page 1 of 3

Background
Photo by Mikhail Nilov:

today1 September 2024

Penetration Testing Justin

SSH “Wide-Compatibility Mode” in Kali Linux

I am in the process of taking the Practical Junior Penetration Tester (PJPT) course from TCM Security and immediately started experiencing problems as I was following the course material. One such issue actually prevented me from utilizing SSH to its full capacity. As of Kali Linux 2022.1, it’s possible to ...

Gears

today25 August 2024

Machine Learning Justin

Machine Learning Concepts – Part 1 – Deployment Introduction

This entry is part 1 of 2 in the series Machine Learning Concepts

  Machine Learning models are key to the continued improvement of artificial intelligence. This article is the first in a series of articles that I’ll be publishing introducing reads to various Machine Learning concepts. First up, we introduce some typical steps involved in producing a machine learning model. 1. Problem ...

Microsoft Excel computer desktop image.

today3 August 2024

General Justin

Displaying Exchange Rates in Microsoft Excel Desktop

In typical Microsoft fashion, the online version of Excel offers the native capability to add currency exchange rates in your Excel spreadsheets. It’s a little trickier in the desktop version of Excel, but I found the following to the best solution. It uses publicly available data from x-rates. Locate the ...

Photo by Pixabay: https://www.pexels.com/photo/close-up-of-figurine-326616/

today17 February 2024

Application Security Justin

A Guide to Public Key Authentication Using SSH

The SSH (Secure Shell) protocol allows an ability to remotely, and securely, access hosts. SSH has various options for authenticating to a host including — password authentication, public-key authentication, and host-based authentication. Before we get into all of that, let’s generate an SSH keypair. Generating an SSH Keypair Most Linux ...