OverTheWire Bandit Level 7: Finding Files by Ownership
OverTheWire Bandit Level 7 walkthrough. Learn how to use the find command to locate files by ownership (user and group), understand file permissions, and search efficiently in Linux.
Cybersecurity insights, tutorials, and industry perspectives. Practical knowledge for defending your business.
OverTheWire Bandit Level 7 walkthrough. Learn how to use the find command to locate files by ownership (user and group), understand file permissions, and search efficiently in Linux.
OverTheWire Bandit Level 8 walkthrough. Learn how to use grep to search for specific text within files, understand piping, and efficiently find information in large files.
OverTheWire Bandit Level 9 walkthrough. Learn how to find unique lines in a file using sort and uniq commands, understand piping, and efficiently process text data in Linux.
Announcing a new educational series covering OverTheWire wargames. Starting with Bandit, then Natas, and beyond. Real walkthroughs, real learning, zero shortcuts.
Reflecting on M Square LLC's first year: what we accomplished, what we learned, and where we're headed in 2026.
Excited to announce I'll be presenting at DEF CON 32 on practical security for small businesses.
Introducing our blog—your resource for practical cybersecurity insights, tutorials, and industry perspectives.
The most common cybersecurity mistakes small and mid-sized businesses make—and practical steps to fix them without breaking your budget.
A practical guide to choosing between free and paid security tools for small and mid-sized businesses—what's worth the investment and where you can save.
A practical guide for executives on how to read and understand penetration test reports—what matters, what doesn't, and how to take action.
A practical guide to multi-factor authentication for SMBs—why it's essential, how to implement it, and how to get your team on board.
A step-by-step guide to building a penetration testing lab at home using entirely free tools—perfect for learning and practicing ethical hacking safely.
Showing 37–48 of 101 posts