alphydan(25)•in #bitcoin•2569 days agoWhat in the world is Bitcoin?This post is a basic introduction to the technology behind Bitcoin. It is based on a talk I gave a few months ago. The audience was assumed to know very little ...2alphydan(25)•in bitcoin•2569 days agoWhat in the world is Bitcoin?This post is a basic introduction to the technology behind Bitcoin. It is based on a talk I gave a few months ago. The audience was assumed to know very little ...2
alphydan(25)•in #virtual-reality•2820 days agoThe end of the written language"What should we call each other?", said Isobel. "Well, we could always start with Mrs Crawley and Lady Grantham", replied Violet. With that dialogue we are ushe...2alphydan(25)•in virtual-reality•2820 days agoThe end of the written language"What should we call each other?", said Isobel. "Well, we could always start with Mrs Crawley and Lady Grantham", replied Violet. With that dialogue we are ushe...2
alphydan(25)•in #teaching•2892 days agoTeaching Cyber Security (Table of Contents)This is the table of contents for a 17 part series on teaching cybersecurity to middle and high school students. Introduction to the shell 1. Introduction, The ...0alphydan(25)•in teaching•2892 days agoTeaching Cyber Security (Table of Contents)This is the table of contents for a 17 part series on teaching cybersecurity to middle and high school students. Introduction to the shell 1. Introduction, The ...0
alphydan(25)•in #linux•2892 days agoTeaching Cyber Security (Part 17)This is the 17th post of a series for teaching cyber-security in a coding-club. Read [part 16] Putting it all together Combining it all In this unit we'll use w...0alphydan(25)•in linux•2892 days agoTeaching Cyber Security (Part 17)This is the 17th post of a series for teaching cyber-security in a coding-club. Read [part 16] Putting it all together Combining it all In this unit we'll use w...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 16)This is the 16th post of a series for teaching cyber-security in a coding-club. Read [part 15] Bash scripts The Shell By now you should be familiar with the ope...1alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 16)This is the 16th post of a series for teaching cyber-security in a coding-club. Read [part 15] Bash scripts The Shell By now you should be familiar with the ope...1
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 15)This is the 15th post of a series for teaching cyber-security in a coding-club. Read [part 14]. Host & whois Information gathering When hackers want to attack a...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 15)This is the 15th post of a series for teaching cyber-security in a coding-club. Read [part 14]. Host & whois Information gathering When hackers want to attack a...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 14)This is the 14th post of a series for teaching cyber-security in a coding-club. Read [part 13]. Ping Pong on the World Wide Web Connecting to the internet In th...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 14)This is the 14th post of a series for teaching cyber-security in a coding-club. Read [part 13]. Ping Pong on the World Wide Web Connecting to the internet In th...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 13)This is the 13th post of a series for teaching cyber-security in a coding-club. Read [part 12] Overview Cowsay Let's install a new program called cowsay. Rememb...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 13)This is the 13th post of a series for teaching cyber-security in a coding-club. Read [part 12] Overview Cowsay Let's install a new program called cowsay. Rememb...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 12)This is the 12th post of a series for teaching cyber-security in a coding-club. Read [part 11] Copying files I need the same file in different directories As we...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 12)This is the 12th post of a series for teaching cyber-security in a coding-club. Read [part 11] Copying files I need the same file in different directories As we...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 11)This is the 11th post of a series for teaching cyber-security in a coding-club. Read [part 10]. Pipes and security Pipes and dictionaries How would you guess a ...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 11)This is the 11th post of a series for teaching cyber-security in a coding-club. Read [part 10]. Pipes and security Pipes and dictionaries How would you guess a ...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 10)This is the 10th post of a series for teaching cyber-security in a coding-club. Read [part 9]. Pipe and count Disk Usage In our mission we may have to inspect l...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 10)This is the 10th post of a series for teaching cyber-security in a coding-club. Read [part 9]. Pipe and count Disk Usage In our mission we may have to inspect l...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 9)This is the 9th post of a series for teaching cyber-security in a coding-club. Read [part 8] Create directories and move files Creating directories We have a lo...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 9)This is the 9th post of a series for teaching cyber-security in a coding-club. Read [part 8] Create directories and move files Creating directories We have a lo...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 8)This is the 8th post of a series for teaching cyber-security in a coding-club. Read [part 7] Seeing processes View all processes in a machine You should have do...0alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 8)This is the 8th post of a series for teaching cyber-security in a coding-club. Read [part 7] Seeing processes View all processes in a machine You should have do...0
alphydan(25)•in #linux•2894 days agoTeaching Cyber Security (Part 7)This is the 7th post of a series for teaching cyber-security in a coding-club. Read [part 6]. Hacking and protecting the secret server Our mission is to get ins...3alphydan(25)•in linux•2894 days agoTeaching Cyber Security (Part 7)This is the 7th post of a series for teaching cyber-security in a coding-club. Read [part 6]. Hacking and protecting the secret server Our mission is to get ins...3
alphydan(25)•in #cibersecurity•2897 days agoTeaching Cyber Security (U2/P3)This post has moved to: https://steemit.com/linux/@alphydan/teaching-cyber-security-part-17...0alphydan(25)•in cibersecurity•2897 days agoTeaching Cyber Security (U2/P3)This post has moved to: https://steemit.com/linux/@alphydan/teaching-cyber-security-part-17...0
alphydan(25)•in #cybersecurity•2972 days agoTeaching Cyber Security (Unit2 - Part 1)Hacking and protecting the secret server Our mission is to get inside this server and fix the security: In the previous unit, we learnt to interact with the she...0alphydan(25)•in cybersecurity•2972 days agoTeaching Cyber Security (Unit2 - Part 1)Hacking and protecting the secret server Our mission is to get inside this server and fix the security: In the previous unit, we learnt to interact with the she...0
alphydan(25)•in #cybersecurity•2978 days agoTeaching Cyber Security (Part 6)This is the 6th post of a series for teaching cyber-security in a coding-club. Read [part 5]. > If you are teaching this course you can clone the files and dire...2alphydan(25)•in cybersecurity•2978 days agoTeaching Cyber Security (Part 6)This is the 6th post of a series for teaching cyber-security in a coding-club. Read [part 5]. > If you are teaching this course you can clone the files and dire...2
alphydan(25)•in #cybersecurity•2981 days agoTeaching Cyber Security (Part 5)This is the 5th post of a series for teaching cyber-security in a coding-club. Read [part 4] Listing hidden files The ls command ommited directories and files w...1alphydan(25)•in cybersecurity•2981 days agoTeaching Cyber Security (Part 5)This is the 5th post of a series for teaching cyber-security in a coding-club. Read [part 4] Listing hidden files The ls command ommited directories and files w...1
alphydan(25)•in #linux•2984 days agoTeaching Cyber Security (Part 4)This is the 4th post of a series for teaching cyber-security in a coding-club. Read [part 3] Where we are currently? Remember that we said our server in Holland...1alphydan(25)•in linux•2984 days agoTeaching Cyber Security (Part 4)This is the 4th post of a series for teaching cyber-security in a coding-club. Read [part 3] Where we are currently? Remember that we said our server in Holland...1
alphydan(25)•in #linux•2984 days agoTeaching Cyber Security (Part 3)This is the 3rd post of a series for teaching cyber-security in a coding-club. Read [part 2] Introduction The shell is sometimes called terminal, command line i...0alphydan(25)•in linux•2984 days agoTeaching Cyber Security (Part 3)This is the 3rd post of a series for teaching cyber-security in a coding-club. Read [part 2] Introduction The shell is sometimes called terminal, command line i...0