PinnedPublished inMac O’ClockNetwork Warrior: How to use macOS network utilitiesNetwork commands, starting from the most popular and quite mythical, ifconfigOct 29, 2020Oct 29, 2020
To Mesh or Not to Mesh?If you are suffering from Wi-Fi coverage issues, then you probably heard someone suggesting “ Go and get yourself a Mesh network “Feb 1, 2022Feb 1, 2022
Cracking codes with pythonGreat book for anyone who wants to learn how cryptography works, and how to implement the knowledge using pythonOct 13, 2021Oct 13, 2021
Published inGeek CultureARP ( Address Resolution Protocol ) demystifiedWhenever a host needs to contact another host, either in its subnet or in another subnet or maybe on the internet, then it sends an ARP (…Aug 19, 2021Aug 19, 2021
The new Apple iPhone WiFi vulnerabilityLet’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can…Jul 6, 2021Jul 6, 2021
Capture Packets on Your FirewallYou can capture (sniff) packets of any traffic that travels on your FortiGate firewall using the command line. Very similar to TCP DumpApr 27, 20211Apr 27, 20211
Factorial Permutations Using PythonWe use the factorial function to multiply the whole numbers from a chosen number down to one.Apr 7, 20211Apr 7, 20211
Published inGeek CultureTransposition Cipher Using Python Random ModuleIn classic cryptography, we have 2 operations that are used throughout the history of hiding messages and turning plain text into a cipher…Apr 2, 2021Apr 2, 2021
Published inInfoSec Write-upsFortigate Firewall Split Tunnel ModeIf you’re using an SSL VPN on your Fortigate Firewall, then you have 3 modes to choose from.Mar 31, 20211Mar 31, 20211
Published inInfoSec Write-upsBase64 ExplainedBase 64 is used everywhere. It is the most known and famous encoding scheme that is used to represent binary data and transform it into an…Mar 31, 20213Mar 31, 20213
Published inInfoSec Write-upsJefferson Cipher WheelThe U.S president Thomas Jefferson was known for his curiosity and interest in the art of cryptography. his most famous crypto invention…Mar 11, 2021Mar 11, 2021
Interested in Fortigate firewall training?If you are new to firewall’s or moving from another firewall platform to a fortigate firewallFeb 5, 2021Feb 5, 2021
Published inInfoSec Write-upsSpeedTest your firewallDid you know that your firewall has an iperf3 client built inside?Nov 29, 2020Nov 29, 2020
10 best Alexa Features that makes it worthThe Amazon Echo Show is one of those home tech gadgets, that once they got into your house, you couldn’t imagine how you ever lived…Nov 21, 2020Nov 21, 2020
Published inInfoSec Write-upsCreating A fake wireless Acess Point in 2 minutesPart 1Nov 11, 2020Nov 11, 2020
7 must-have gadgets for this ChristmasI usually do security-related articles here on medium. from time to time, I also write on Apple devices, but most of the times, I’m a…Nov 11, 20201Nov 11, 20201
Published inMac O’ClockApple changes our sound perceptionThe same as it did with our reality perceptionNov 8, 2020Nov 8, 2020