History - Computing in the 1990s: The Emergence of Linux and Open-Source Software

The article explores the history of open-source software and its impact on the computing industry, from the rise of Microsoft and proprietary software, to the birth of Linux and the GNU Project, the emergence of open-source software, and the mainstreaming of open-source software, highlighting key players, developments, and anecdotes, while also discussing its relevance to cybersecurity and the need for community-driven development and collaboration.

Lua Programming Language - Basic Concepts and Syntax

This article is an introduction to the Lua programming language for pen testers and red team members, covering its basic concepts and syntax, examples of its use in network analysis, password cracking, and web scraping, and weighing its pros and cons compared to other languages.

Computer History - The Birth of the Intel x86 Architecture

This article is a comprehensive overview of the history and evolution of the x86 architecture, including its predecessors, competitors, and its significance to cybersecurity.

PowerShell Scripting - Basic Concepts and Syntax

This article provides an introduction to PowerShell scripting, including basic concepts and syntax, specific code examples for pen testing and red teaming tasks, and the language’s pros and cons compared to other programming languages in the field.

Computer History - The History of Apple Computers

The history of Apple Computers is a story of innovation, transformation, and persistence, characterized by the development of iconic products and groundbreaking technologies, from the early days of personal computing to the present, where the company has become a global leader in technology, valued at over $2 trillion, with a diverse range of products and services that touch every aspect of modern life.

Cyber Threat Intelligence - Best Practices and Techniques

This article discusses best practices and techniques for effective Cyber Threat Intelligence (CTI) collection, analysis, and dissemination for red teams and pen testers.

C++ Programming Language - Basic Concepts and Syntax

This article provides a short guide to the C++ programming language, covering its basic concepts and syntax, as well as its application in pen testing and red teaming, including code examples for a port scanner, password cracker, and web crawler, and discussing its pros and cons compared to other languages for these purposes.

Computer History - The History of IBM and the Clone Wars

This article provides a detailed history of IBM and the clone wars in the computing industry, including the birth of IBM, the rise of clones, the clone wars, the aftermath, and how it all relates to cybersecurity.

Kotlin Programming Language - Basic Concepts and Syntax

This article discusses the basic concepts and syntax of the Kotlin programming language, as well as its applications in pen testing and red teaming, including code examples for a port scanner, password cracker, and web crawler, and compares its pros and cons to other languages used in the field.

Computer History - The Dot-Com Bubble

The article covers the history of the dot-com bubble, from the early days of the internet to the rise of venture capital, the height of the dot-com era, the crash, and the aftermath, while also examining its impact on cybersecurity.