Caesar Cipher

The Caesar cipher is a classic example of ancient cryptography and is said to have been used by Julius Caesar. The Caesar cipher is based on transposition and involves shifting each letter of the plaintext message by a certain number of letters, historically three, as shown in Figure 5.1. The ciphertext can be decrypted by applying the same number of shifts in …

Caesar Cipher Read More »

How to install Outline Server On Ubuntu 20.04

Steps to install Outline VPN on Ubuntu The following steps include installing docker and setting up Outline VPN followed by updating and upgrading dependency packages. 1. First Update and upgrade the packages sudo — sh -c ‘apt-get update; apt-get upgrade -y; apt-get dist-upgrade -y; apt-get autoremove -y; apt-get autoclean -y’ 2. Install Docker sudo curl …

How to install Outline Server On Ubuntu 20.04 Read More »

How to hack Home WiFi

Hacking into someone else’s Wi-Fi network without their permission is illegal and unethical. I cannot provide you with instructions on how to hack into a Wi-Fi network. It’s important to respect the privacy and security of others and to use your own network or seek permission to use a network before accessing it. Additionally, hacking …

How to hack Home WiFi Read More »

Step-By-Step Guide: How to Install Windows 11 on a GPT Partition

Preparation: Confirm Computer Supports UEFI Boot Mode For anyone who wants to install or upgrade Windows 11, they should check if their computer meets the Windows 11 requirements first,especially if the motherboard of the computer supports UEFI Boot Mode. Check Windows 11 System Requirements: How to Check If Computer Supports UEFI Boot Mode Step 1. Restart …

Step-By-Step Guide: How to Install Windows 11 on a GPT Partition Read More »

Nmap Cheat Sheet

Target Specification SWITCH EXAMPLE DESCRIPTION nmap 192.168.1.1 Scan a single IP nmap 192.168.1.1 192.168.2.1 Scan specific IPs nmap 192.168.1.1-254 Scan a range nmap scanme.nmap.org Scan a domain nmap 192.168.1.0/24 Scan using CIDR notation -iL nmap -iL targets.txt Scan targets from a file -iR nmap -iR 100 Scan 100 random hosts –exclude nmap –exclude 192.168.1.1 Exclude …

Nmap Cheat Sheet Read More »

Scroll to Top