nemozone

a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!

Devop Exes

Here you can find a lot of exercises :)

https://github.com/bregman-arie/devops-exercises

“Get Google search results, but without any ads, javascript, AMP links, cookies, or IP address tracking. Easily deployable in one click as a Docker app, and customizable with a single config file. Quick and simple to implement as a primary search engine replacement on both desktop and mobile” – ben busby

https://github.com/benbusby/whoogle-search

Public instaces

Disclaimer: “Note: Use public instances at your own discretion. Maintainers of Whoogle do not personally validate the integrity of these instances, and popular public instances are more likely to be rate-limited or blocked.”

https://whoogle.sdf.org https://whoogle.kavin.rocks https://search.garudalinux.org https://whooglesearch.net https://search.flawcra.cc https://search.exonip.de/ https://s.alefvanoon.xyz https://search.flux.industries http://whoogledq5f5wly5p4i2ohnvjwlihnlg4oajjum2oeddfwqdwupbuhqd.onion

http://whoogledq5f5wly5p4i2ohnvjwlihnlg4oajjum2oeddfwqdwupbuhqd.onion.ly

So first we open our terminal as always CTRL+Alt+t or Alt + F2 and then search for console/terminal

IMPORTANT!:

Always keep in mind that no software nor hardware is perfect, mistakes and errors can happen. Therefore, please apply a backup of all your relevant files/data!

Download the latest version from here

https://github.com/ventoy/Ventoy/releases

Extract the .tar file move into the extracted folder Make this file executable Ventoy2Disk.sh

chmod +x Ventoy2Disk.sh

Then run this command lsblk

Then insert your USB Stick into your computer

Run again lsblk

Determine your block device and then run this command

sudo sh Ventoy2Disk.sh -u /dev/sdx

sdx here is your device, it could look something like this. Keep in mind you determine the device 100 % because this could delete all files on a SSD/HDD! Just saying :)

sudo sh Ventoy2Disk.sh -u /dev/sdb

You are done, cheers

Keep in mind, obtaining console bios versions and ISO's which don't belong to you are illegal!

Here you can find a splendid site for emulators

https://www.emuparadise.me/

An example in German

https://wiki.ubuntuusers.de/Mupen64Plus/

As you've already noticed, I'm not a fan of Windows whatsoever.

Due to my job in the IT field, I still come in contact with this sorry excuse of an operating system therefore I also collect knowledge about this junk/garbage/rubbish. I.e. sorry excuse of an OS i.e. Trojan in an OS Cloak.

On some older hardware, for example on desktop devices, it's even possible to add TPM modules after the purchase.

https://www.tomshardware.com/how-to/bypass-windows-11-tpm-requirement

Some additional info in German

https://tarnkappe.info/windows-11-auf-inkompatibler-hardware-betreiben/

Rufus patcht Windows 11 Image – by Sempervideo

https://www.computerbase.de/2021-10/windows-11-ohne-tpm-2.0-auch-das-tool-ventoy-umgeht-die-restriktionen-per-bypass/

“Steganography is the art of hiding messages within other messages or data. Most commonly we see this utilized with pictures. This is probably encryption at its finest. Mostly because it doesn't look like usual garbled text that we are used to seeing with encryption…”

For further reading:

https://www.blackmoreops.com/2017/01/11/steganography-in-kali-linux-hiding-data-in-image/

https://linuxconfig.org/steganography-made-easy-in-linux

Your Passwords Are Useless!

https://yt.artemislena.eu/embed/ze2i9V1_aIc

Alternative link.:

Good crypto token providers

https://www.nitrokey.com/#comparison

https://www.yubico.com/products/

https://puri.sm/products/librem-key/

https://solokeys.com/

Here you can check out which services provide fido, support.

https://2fa.directory/

Better stick to the Nitrokeys they are IMHO much better

Some German sources for further reading, maybe for future articles in German ¯_(ツ)_/¯

https://www.kuketz-blog.de/zwei-schluessel-fuer-alle-faelle-nitrokey-teil1/

https://www.kuketz-blog.de/system-authentifizierung-via-nitrokey-digitaler-schutzschild-teil9/

https://privat.albicker.org/blog/2021-01-27-fido2-nitrokey-linux.html