nemozone

a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!

“In 1985 Steve Jobs resigned from Apple and founded NeXT Inc. in order to build the NeXT Computer. It was ahead of its time and had amazing features thanks to the NeXTSTEP operating system, most famously used at CERN by Sir Tim Berners-Lee to create the World Wide Web. NeXTSTEP later became OPENSTEP and when Apple acquired NeXT in 1997, they used it as the basis for Mac OS X and iOS. If you've done any Mac or iOS programming, you've seen the echoes of NeXTSTEP in the type names – NSObject, NSString, NSDictionary, and many others all come directly from NeXT (NS = NeXTSTEP).

These computers cost about as much as a new car when they first came out, so they were out of reach for most people. What was it like to use a top of the line system in the early 90s? Let's build our own and find out!…”

https://learn.adafruit.com/build-your-own-next-with-a-virtual-machine?view=all

“Portmaster : Take Back Control of Your Computer ( Love Freedom – Block Mass Surveillance ) – Portmaster is a free and open-source application that puts you back in charge over all your computer's network connection…”

https://github.com/safing/portmaster

Linux kernel security is a very complex topic. Some defence technologies are provided by the Linux kernel mainline. Others are going out‑of‑tree for various reasons (some of them are commercial, for example). Plus there are kernel defences that depend on special hardware features…

https://github.com/a13xp0p0v/linux-kernel-defence-map

The map

A rubber ducky is a tool that can be used to takeover most computers just by being plugged into them for a few seconds. How it works is an attacker plugs a USB into a computer, this USB acts as a keyboard and injects keystrokes at superhuman speed. Often these keystrokes are commands that tell the victim computer to connect itself to the attacker’s computer (aka a reverse shell)·…

Source: https://www.pranavc.tech/phone-rubber-ducky/

https://github.com/armosec/kubescape

Disclaimer: Watch out this link redirects to a US .gov page, better use TOR or something! Just saying.

https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF

Devop Exes

Here you can find a lot of exercises :)

https://github.com/bregman-arie/devops-exercises

“Get Google search results, but without any ads, javascript, AMP links, cookies, or IP address tracking. Easily deployable in one click as a Docker app, and customizable with a single config file. Quick and simple to implement as a primary search engine replacement on both desktop and mobile” – ben busby

https://github.com/benbusby/whoogle-search

Public instaces

Disclaimer: “Note: Use public instances at your own discretion. Maintainers of Whoogle do not personally validate the integrity of these instances, and popular public instances are more likely to be rate-limited or blocked.”

https://whoogle.sdf.org https://whoogle.kavin.rocks https://search.garudalinux.org https://whooglesearch.net https://search.flawcra.cc https://search.exonip.de/ https://s.alefvanoon.xyz https://search.flux.industries http://whoogledq5f5wly5p4i2ohnvjwlihnlg4oajjum2oeddfwqdwupbuhqd.onion

http://whoogledq5f5wly5p4i2ohnvjwlihnlg4oajjum2oeddfwqdwupbuhqd.onion.ly