Don't format, overwrite before you sell! - Recovering data from 2nd hand HDDs
People who sell their computer usually care about their privacy and don't forget to format the drives. However, often this is not enough and I'll try
People who sell their computer usually care about their privacy and don't forget to format the drives. However, often this is not enough and I'll try
This year I've teamed up with my two colleagues Denis and Moritz from the @enoflag team. Together we solved some challenges for fun and profit and scored the
This won't be a technical blogpost, but rather a description of my tiny social engineering experience I gathered when I decided to enter the IFA exhibition for free.
This blogpost is a short tutorial on how to efficiently generate vanity Bitcoin addresses on AWS' GPU instance and the resulting performance. The next CTF, namely the ASIS Cyber
I've recently started to look into basic application security concepts using the imho excellent material from OpenSecurityTraining.info [http://opensecuritytraining.info/Exploits1.html]. In this blogpost I'