BlogHide Resteemsalphydan (35)in bitcoin • 6 years agoWhat in the world is Bitcoin?This post is a basic introduction to the technology behind Bitcoin. It is based on a talk I gave a few months ago. The audience was assumed to know very little about the technology.…alphydan (35)in virtual-reality • 7 years agoThe end of the written language"What should we call each other?" , said Isobel. "Well, we could always start with Mrs Crawley and Lady Grantham" , replied Violet. With that dialogue we are ushered into Downtown Abbey …alphydan (35)in teaching • 7 years agosteemCreated with Sketch.Teaching Cyber Security (Table of Contents)This is the table of contents for a 17 part series on teaching cybersecurity to middle and high school students. Introduction to the shell Introduction , The challenge and introduction to…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 17)This is the 17th post of a series for teaching cyber-security in a coding-club. Read [ part 16 ] Putting it all together Combining it all In this unit we'll use what we have learnt in the…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 16)This is the 16th post of a series for teaching cyber-security in a coding-club. Read [ part 15 ] Bash scripts The Shell By now you should be familiar with the operation of the shell (and the…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 15)This is the 15th post of a series for teaching cyber-security in a coding-club. Read [ part 14 ]. Host & whois Information gathering When hackers want to attack a target they will have an…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 14)This is the 14th post of a series for teaching cyber-security in a coding-club. Read [ part 13 ]. Ping Pong on the World Wide Web Connecting to the internet In the first module you learnt…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 13)This is the 13th post of a series for teaching cyber-security in a coding-club. Read [ part 12 ] Overview Cowsay Let's install a new program called cowsay . Remember you can do that with:…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 12)This is the 12th post of a series for teaching cyber-security in a coding-club. Read [ part 11 ] Copying files I need the same file in different directories As we have learned, bash…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 11)This is the 11th post of a series for teaching cyber-security in a coding-club. Read [ part 10 ]. Pipes and security Pipes and dictionaries How would you guess a password? A lot of people…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 10)This is the 10th post of a series for teaching cyber-security in a coding-club. Read [ part 9 ]. Pipe and count Disk Usage In our mission we may have to inspect large files. For example…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 9)This is the 9th post of a series for teaching cyber-security in a coding-club. Read [ part 8 ] Create directories and move files Creating directories We have a lot of files and folders on…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 8)This is the 8th post of a series for teaching cyber-security in a coding-club. Read [ part 7 ] Seeing processes View all processes in a machine You should have done the following: sudo apt…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 7)This is the 7th post of a series for teaching cyber-security in a coding-club. Read [ part 6 ]. Hacking and protecting the secret server Our mission is to get inside this server and fix…alphydan (35)in cibersecurity • 7 years agoTeaching Cyber Security (U2/P3)This post has moved to:alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Unit2 - Part 1)Hacking and protecting the secret server Our mission is to get inside this server and fix the security : In the previous unit, we learnt to interact with the shell , to send…alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Part 6)This is the 6th post of a series for teaching cyber-security in a coding-club. Read [ part 5 ]. If you are teaching this course you can clone the files and directories to follow along. The…alphydan (35)in cybersecurity • 7 years agoTeaching Cyber Security (Part 5)This is the 5th post of a series for teaching cyber-security in a coding-club. Read [ part 4 ] Listing hidden files The ls command ommited directories and files with a dot Aha! You are…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 4)This is the 4th post of a series for teaching cyber-security in a coding-club. Read [ part 3 ] Where we are currently? Remember that we said our server in Holland won't have a mouse, a…alphydan (35)in linux • 7 years agoTeaching Cyber Security (Part 3)This is the 3rd post of a series for teaching cyber-security in a coding-club. Read [ part 2 ] Introduction The shell is sometimes called terminal , command line interface or CLI.…