toalsty (37)in #technology • 5 years agoHow to setup a small Windows Domain in Virtualbox Part 1We will setup a small Windows domain with the following virtualboxes: 1 debian system that acts as a Nat…toalsty resteemedtwr (53)in #bestvpn • 6 years agoWhat Is the Most Secure VPN Protocol?VPN products vary greatly in convenience, efficiency, and security. If security is a serious concern, an organization…toalsty (37)in #trading • 6 years agoCalculating correlation between two stocks with Python!Today we‘ll look at how we can utilize python to give us the correlation between two stocks. Our goal is to write a…toalsty (37)in #windows • 6 years agoChecking your Windows Registry Pt. 1(Keys where viruses might hide)The Registry: What is the Windows Registry? The Registry is a database containing several entries concerning…toalsty (37)in #trading • 6 years agoThe Gator Indicator(Scripting in Tradingview 2)Here is the link to the first part: Part One Today we will look at the so called alligator indicator and the…toalsty (37)in #tutorial • 6 years agoAn introduction to scripting in Tradingview!Today we will look at some of the possibilities that come with Tradingviews scripting language, called Pine. It…toalsty (37)in #technology • 6 years agoLibrem 5, the privacy phone!Hey guys, Today i just want to share with you the Librem 5. It's a smartphone that runs on PureOS which is linux…toalsty resteemedtwr (53)in #2019bestvpn • 6 years agoHow to choose a reliable VPN provider for 2019With the constant growth of cybercrime and Internet surveillance, comes widespread popularity of VPN services. The…toalsty (37)in #security • 6 years agoChaos Computer Congress TalksHappy New Year everybody, Just dropped by to share with you the talks from this years 35C3 I liked the most so…toalsty (37)in #technology • 6 years agoA little python script for evaluating subdomains!So today we have a little python script i wrote that helps you evaluate subdomains for a given domain. We will look at…toalsty (37)in #technology • 6 years agoHacking with Word Macros!Macros: So, what are macros? Macros are a way to automate tasks in office documents. You can record them or write…toalsty (37)in #technology • 6 years agoHow to acquire a memory image for later analysis!(Forensics)Why do we want to get a systems memory for later Analysis? Let‘s say you had an incident on a machine in your network…toalsty (37)in #technology • 6 years agoFind hosts for tcpdump to use!In the last little tutorial you might‘ve asked yourself where we got the IP-Addresses from when we typed the…toalsty (37)in #trading • 6 years agoHow the broker and trading industry worksHey guys, Since I am interested in trading too, I wanted to drop by to share the following video I think is very…toalsty (37)in #technology • 6 years agoHow to capture Network packets with Tcpdump!In this part we‘ll have a look at packet-capturing and ARP-Spoofing. So what‘s going to happen now? We are going to…toalsty (37)in #hacking • 6 years agoA little introduction to Network Packets 3(ARP)MAC-Address : What is a MAC-Address? The MAC-Address is a hardware-address that is unique to every network…toalsty (37)in #technology • 6 years agoA little introduction to network packets 2After the IP-layer comes the transport layer which is divided into TCP and UDP. This is just a general overview of the…toalsty (37)in #network • 6 years agoA little Introduction to network packets 1So, what are network packets and protocols? A network packet is a unit of formatted data that is used for…toalsty (37)in #programming • 7 years agoGetting started with Pentesting!Hey Guys and Girls, since I am interested in Pentesting I wanted to share some sources with you with great…