-
How to Attach Additional Block Volume in Oracle Cloud Instance
As I continued rolling out new features across several services in my infrastructure, I noticed disk space was starting to run low. Fortunately, my Oracle Cloud instance still had some unallocated block volume available, but since I wasn’t too familiar with the Oracle Cloud Console, I had to figure things out as I went. In…
-
How to OSV: Vulnerabilities API, Scanners, and a Bit of Hope
Security vulnerabilities in open-source dependencies are like background radiation, mostly ignorable, until they’re not. Since we are currently working on vulnerability detection research, today, I decided to see how much trouble I could get into by poking around Google’s Open Source Vulnerabilities database and its scanner. Spoiler: not much. But it’s interesting trouble. What is…
-
How to Learn SQL in Only 10 Minutes
I used to hate SQL. Too many keywords, weird syntax, and you always need some dummy table to even get started. But today, I finally sat down and said: “Alright. Lets teach myself SQL like I have 10 minutes before a demo.” So here’s what I learned, I wish someone told me earlier. SQL is…
-
How To Easily Deploy Pixtral Large Using Docker VLLM For Self Hosting With One Liner Command
Recently, Mistral has released a powerful multimodal model with 123B parameters. In this blog post, we will first understand what Pixtral is. Then, we will quickly get into the process of deploying Pixtral Large using VLLM.
-
How to Enable Browsing when You Have SSH Access
Introduction If you have access to SSH into a machine, it means you have full control of that machine. However if not all of the things can be done via terminal SSH, sometimes you need to browse some sites using that machine connection. The simplest solution for this is to create an SSH tunnel. SSH…
-
How to Install the Latest OpenWRT on Arduino Yun
By the time I am writing this, this might be the first article that tells you how to install OpenWRT on Arduino Yun because no one talks about it. Also, Arduino Yun is already reached its end of life, and the version history is not well documented in each article so I will write it…
-
How to Find and Connect to Hidden Wifi Network
Suppose you have a device that communicates using wifi, and you already know the password, but you can’t find the SSID name on your phone or computer. How can you connect? In this post, I will show you how to find and connect to the hidden network using Kali Linux. Prerequisites Getting SSID Name Make…
-
How to Install Alfa AWUS036NH Driver for Kali Linux
This wifi adapter is an important weapon for penetration testers due to its feature that supports monitor and packet injection mode on a 2.4Ghz network. However, even if Alfa said it is already supported out of the box in Kali Linux, I found it unstable out of the box. Sometimes it goes undetected. So here…
-
How to Do Buffer Overflow Attack on 64bit Machine
Professor’s course material was out of date. He made an example of a buffer overflow attack several years ago. Then here I am, asked to fix the code to work on a modern machine, 64bit Kali Linux. There should be no difference with other Linux; you can practice this on any 64bit Linux machine. Prerequisite…