toalsty (37)in #technology • 5 years ago • NoneHow to setup a small Windows Domain in Virtualbox Part 1We will setup a small Windows domain with the following virtualboxes: 1 debian system that acts as a Nat…toalsty resteemedtwr (53)in #bestvpn • 6 years ago • NoneWhat Is the Most Secure VPN Protocol?VPN products vary greatly in convenience, efficiency, and security. If security is a serious concern, an organization…toalsty (37)in #trading • 6 years ago • NoneCalculating correlation between two stocks with Python!Today we‘ll look at how we can utilize python to give us the correlation between two stocks. Our goal is to write a…toalsty (37)in #windows • 6 years ago • NoneChecking your Windows Registry Pt. 1(Keys where viruses might hide)The Registry: What is the Windows Registry? The Registry is a database containing several entries concerning…toalsty (37)in #trading • 6 years ago • NoneThe Gator Indicator(Scripting in Tradingview 2)Here is the link to the first part: Part One Today we will look at the so called alligator indicator and the…toalsty (37)in #tutorial • 6 years ago • NoneAn introduction to scripting in Tradingview!Today we will look at some of the possibilities that come with Tradingviews scripting language, called Pine. It…toalsty (37)in #technology • 6 years ago • NoneLibrem 5, the privacy phone!Hey guys, Today i just want to share with you the Librem 5. It's a smartphone that runs on PureOS which is linux…toalsty resteemedtwr (53)in #2019bestvpn • 6 years ago • NoneHow to choose a reliable VPN provider for 2019With the constant growth of cybercrime and Internet surveillance, comes widespread popularity of VPN services. The…toalsty (37)in #security • 6 years ago • NoneChaos Computer Congress TalksHappy New Year everybody, Just dropped by to share with you the talks from this years 35C3 I liked the most so…toalsty (37)in #technology • 6 years ago • NoneA little python script for evaluating subdomains!So today we have a little python script i wrote that helps you evaluate subdomains for a given domain. We will look at…toalsty (37)in #technology • 6 years ago • NoneHacking with Word Macros!Macros: So, what are macros? Macros are a way to automate tasks in office documents. You can record them or write…toalsty (37)in #technology • 6 years ago • NoneHow to acquire a memory image for later analysis!(Forensics)Why do we want to get a systems memory for later Analysis? Let‘s say you had an incident on a machine in your network…toalsty (37)in #technology • 6 years ago • NoneFind hosts for tcpdump to use!In the last little tutorial you might‘ve asked yourself where we got the IP-Addresses from when we typed the…toalsty (37)in #trading • 6 years ago • NoneHow the broker and trading industry worksHey guys, Since I am interested in trading too, I wanted to drop by to share the following video I think is very…toalsty (37)in #technology • 6 years ago • NoneHow to capture Network packets with Tcpdump!In this part we‘ll have a look at packet-capturing and ARP-Spoofing. So what‘s going to happen now? We are going to…toalsty (37)in #hacking • 6 years ago • NoneA little introduction to Network Packets 3(ARP)MAC-Address : What is a MAC-Address? The MAC-Address is a hardware-address that is unique to every network…toalsty (37)in #technology • 6 years ago • NoneA little introduction to network packets 2After the IP-layer comes the transport layer which is divided into TCP and UDP. This is just a general overview of the…toalsty (37)in #network • 6 years ago • NoneA little Introduction to network packets 1So, what are network packets and protocols? A network packet is a unit of formatted data that is used for…toalsty (37)in #programming • 7 years ago • NoneGetting started with Pentesting!Hey Guys and Girls, since I am interested in Pentesting I wanted to share some sources with you with great…