Cybersecurity Index
👑 Hacking - The Art of Exploitation
How to become a hacker
2nd edition
Get into Cybersecurity
Linus Torvalds god
The harsh truth about Hacking
🔑 Authentification vs Authorization - What's the Difference?
authentication authentication
authenticated users vs users
authentication authentication
authentication authentication
Stackoverflow
🔑 Backups Done Right - How to Safe your Private Data
strategies
system
delete
protection
server
🔑 The NAS-Model - Explained Simple
Synology
UGREEN
QNAP
NAS vs. Cloud
system
The Microsoft MIM-PAM Test Suite
SetADForestFunctionalLevel
Failure
Portal Installer
Verbose Logging
Troubleshooting
I have opened a Phishing Mail. Help.
meme
example
meaning
checker
from my own address
🔑 Identity Access Management (IAM) - What that is
identity center
policy
roles
admin
simulator
🔑 Multi-Factor Authentication (MFA)
authentication authorization
authenticated users vs users
authentication
discord
microsoft
🔑 Sanitizing - How to validate Input in HTML + JS
string
html
input
string for sql
json
🔑 XSS - Cross Site Scripting
payloads
dom based
xsx vs xss
x-xss protection
reflected
🔑 The OSI Model
Explained simple
In simple terms
learning cybersecurity
vizualisation
diagrams of each layer
🔑 WAF - Web Application Firewalls
firewall
pricing
rules
azure
logs
🔑 CORS - Cross Origin Resource Sharing
missing
allow origin
localhost
chrome extension
free
🔑 Content Security Policies
vs cords
header
assets
army
evaluator
🔑 SQL-Injections - The problematic Truth
prevention
attack
test
types
aws