by hellor00t | Aug 27, 2017 | hacking, Hardware
Homelabbers rejoice! In this review we are welcoming the Protectli 6 Port Vault to the home security hardware market. We have been in the market for something like this for a few months and while researching several products we stumbled across a CPU requirement for...
by ArtificialAmateur | Jun 3, 2017 | hacking, Hardware, roadmap, security, technology
Basics The GPU is the graphics processing unit, sometimes referred to as graphics card or visual processing unit (VPU). Commonly used for processing imagery, it is used to handle resource intensive computations that may overload your standard Central Processing Unit...
by InCIDRthreat | Oct 25, 2016 | hacking, technology, tutorials
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...
by InCIDRthreat | Dec 16, 2015 | hacking, Hardware, security, technology
Basics RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time...
by hellor00t | Oct 3, 2015 | hacking, Hardware, security, technology
Basics Network interface cards or NIC’s are what connect computers to networks. If you haven’t heard about it yet, the OSI Model is the concept that all computers use to communicate with each other. There are seven layers the begin with the physical layer...
by hellor00t | Aug 29, 2015 | electronics, technology
Introduction What is DOCSIS? What is downstream vs upstream? What are cable modem channels? What is channel bonding? What is QAM? Introduction If you’ve tried to purchase a cable modem recently, you’ll be met with a barrage of terminology that you may have never heard...