<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>0ut3r Space</title>
  
  <subtitle>News From Outer Space</subtitle>
  <link href="http://0ut3r.space/atom.xml" rel="self"/>
  
  <link href="http://0ut3r.space/"/>
  <updated>2024-02-09T12:51:08.000Z</updated>
  <id>http://0ut3r.space/</id>
  
  <author>
    <name>hoek</name>
    
  </author>
  
  <generator uri="https://hexo.io/">Hexo</generator>
  
  <entry>
    <title>TLS Certificate for Onion domain</title>
    <link href="http://0ut3r.space/2024/02/09/tls-cert-for-onion/"/>
    <id>http://0ut3r.space/2024/02/09/tls-cert-for-onion/</id>
    <published>2024-02-09T12:45:00.000Z</published>
    <updated>2024-02-09T12:51:08.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;I had completely forgotten about this topic. I remembered that I was interested in it in the past, but when the topic of TLS certificates for onion domains came up, it was only available from DigiCert and that was not a financially viable option for me. Ultimately, these are solutions more for business. Fortunately, Harica came along, which I</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="tor" scheme="http://0ut3r.space/tags/tor/"/>
    
    <category term="onion" scheme="http://0ut3r.space/tags/onion/"/>
    
    <category term="tls onion" scheme="http://0ut3r.space/tags/tls-onion/"/>
    
    <category term="onion certificate" scheme="http://0ut3r.space/tags/onion-certificate/"/>
    
    <category term="harica" scheme="http://0ut3r.space/tags/harica/"/>
    
  </entry>
  
  <entry>
    <title>Fuzz the world</title>
    <link href="http://0ut3r.space/2024/01/20/fuzz-the-world/"/>
    <id>http://0ut3r.space/2024/01/20/fuzz-the-world/</id>
    <published>2024-01-20T18:57:00.000Z</published>
    <updated>2024-01-20T19:06:05.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;At the beginning of my pentesting journey, I was not quite sure what fuzzing was. Even though I used it all the time. &lt;/p&gt;
&lt;p&gt;Being an amateur guitarist myself, fuzz to me was just a guitar effect that sounded like overdrive, but broken, like the amp had broken down and something was whining. As I didn’t have many colleagues, and still don’t,</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="fuzzing" scheme="http://0ut3r.space/tags/fuzzing/"/>
    
    <category term="fuzz" scheme="http://0ut3r.space/tags/fuzz/"/>
    
  </entry>
  
  <entry>
    <title>Worth checking ep.2</title>
    <link href="http://0ut3r.space/2023/12/17/worth-checking-2/"/>
    <id>http://0ut3r.space/2023/12/17/worth-checking-2/</id>
    <published>2023-12-17T19:00:00.000Z</published>
    <updated>2023-12-17T18:58:10.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;I hope you haven’t forgotten about the Worth Checking series. &lt;a href=&quot;/2023/07/04/worth-checking-1/&quot;&gt;Here&lt;/a&gt; you can check out the latest one. I thought I’d post monthly in this format, but it would turn out that I’d have more entries like this than my own :) If there were maybe 10 articles a month, it would make as much sense as possible.</summary>
        
      
    
    
    
    <category term="resources" scheme="http://0ut3r.space/categories/resources/"/>
    
    
    <category term="worth checking" scheme="http://0ut3r.space/tags/worth-checking/"/>
    
    <category term="interesting materials" scheme="http://0ut3r.space/tags/interesting-materials/"/>
    
    <category term="interesting resources" scheme="http://0ut3r.space/tags/interesting-resources/"/>
    
    <category term="bookmarks" scheme="http://0ut3r.space/tags/bookmarks/"/>
    
    <category term="videos" scheme="http://0ut3r.space/tags/videos/"/>
    
    <category term="documents" scheme="http://0ut3r.space/tags/documents/"/>
    
    <category term="links" scheme="http://0ut3r.space/tags/links/"/>
    
  </entry>
  
  <entry>
    <title>Miyoo Mini Plus</title>
    <link href="http://0ut3r.space/2023/11/23/miyoo-mini-plus/"/>
    <id>http://0ut3r.space/2023/11/23/miyoo-mini-plus/</id>
    <published>2023-11-23T14:16:00.000Z</published>
    <updated>2023-12-09T15:24:48.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Howdy motherf… dear readers of this wonderful blog. Sometimes I spend money on things that waste my time. I hate doing this, I mean, buying consoles to play games and then realizing that I do nothing but play games for weeks on end. But what the heck, after all, you have to relax sometimes, better this kind of entertainment than partying and</summary>
        
      
    
    
    
    <category term="entertainment" scheme="http://0ut3r.space/categories/entertainment/"/>
    
    
    <category term="Miyoo Mini Plus" scheme="http://0ut3r.space/tags/Miyoo-Mini-Plus/"/>
    
    <category term="Firmware update" scheme="http://0ut3r.space/tags/Firmware-update/"/>
    
    <category term="Onion OS" scheme="http://0ut3r.space/tags/Onion-OS/"/>
    
    <category term="Console" scheme="http://0ut3r.space/tags/Console/"/>
    
    <category term="Pico 8" scheme="http://0ut3r.space/tags/Pico-8/"/>
    
  </entry>
  
  <entry>
    <title>Mining cryptocurrency - don&#39;t do it at home</title>
    <link href="http://0ut3r.space/2023/10/27/minig-cryptocurrency/"/>
    <id>http://0ut3r.space/2023/10/27/minig-cryptocurrency/</id>
    <published>2023-10-27T10:07:00.000Z</published>
    <updated>2023-10-27T10:10:20.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;More of a curiosity than a full-blown article, but I was mining a cryptocurrency for a while this week on an average computer. I mean, a long time ago, when Bitcoin was &lt;a href=&quot;https://en.wikipedia.org/wiki/History_of_bitcoin&quot;&gt;worth so much as nothing&lt;/a&gt;, I mined Bitcoins too. This week I just happened to have a computer with a good CPU,</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="mining crypto" scheme="http://0ut3r.space/tags/mining-crypto/"/>
    
    <category term="monero mining" scheme="http://0ut3r.space/tags/monero-mining/"/>
    
    <category term="masari mining" scheme="http://0ut3r.space/tags/masari-mining/"/>
    
    <category term="xmrig" scheme="http://0ut3r.space/tags/xmrig/"/>
    
    <category term="conceal mining" scheme="http://0ut3r.space/tags/conceal-mining/"/>
    
    <category term="pool mining" scheme="http://0ut3r.space/tags/pool-mining/"/>
    
  </entry>
  
  <entry>
    <title>OpenSSH hardening</title>
    <link href="http://0ut3r.space/2023/10/24/openssh-hardening/"/>
    <id>http://0ut3r.space/2023/10/24/openssh-hardening/</id>
    <published>2023-10-24T14:50:00.000Z</published>
    <updated>2023-10-24T15:01:47.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;If you manage or administer a server, you need secure access to it. In Windows it’s RDP (&lt;a href=&quot;https://en.wikipedia.org/wiki/Remote_Desktop_Protocol&quot;&gt;Remote Desktop Protocol&lt;/a&gt;), usually configured with VPN or a jump host (&lt;a href=&quot;https://en.wikipedia.org/wiki/Jump_server&quot;&gt;jump server, jump box&lt;/a&gt;). On Linux it is the &lt;a</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="OpenSSH hardening" scheme="http://0ut3r.space/tags/OpenSSH-hardening/"/>
    
    <category term="hardening" scheme="http://0ut3r.space/tags/hardening/"/>
    
    <category term="SSH server hardening" scheme="http://0ut3r.space/tags/SSH-server-hardening/"/>
    
  </entry>
  
  <entry>
    <title>Test web server for VirtualBox</title>
    <link href="http://0ut3r.space/2023/09/24/test-web-server/"/>
    <id>http://0ut3r.space/2023/09/24/test-web-server/</id>
    <published>2023-09-24T14:20:00.000Z</published>
    <updated>2023-09-24T14:18:42.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;It is very important to have a development or test environment for whatever you are working on. It does not matter if it is your home made project, your personal website, your school project or your work stuff. You should always follow good practice and have a test environment (with backup) for all changes and experiments before going into</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="nginx" scheme="http://0ut3r.space/tags/nginx/"/>
    
    <category term="php" scheme="http://0ut3r.space/tags/php/"/>
    
    <category term="test web server" scheme="http://0ut3r.space/tags/test-web-server/"/>
    
    <category term="virtual box" scheme="http://0ut3r.space/tags/virtual-box/"/>
    
    <category term="MariaDB" scheme="http://0ut3r.space/tags/MariaDB/"/>
    
  </entry>
  
  <entry>
    <title>Windows security and privacy</title>
    <link href="http://0ut3r.space/2023/08/20/windows-security-and-privacy/"/>
    <id>http://0ut3r.space/2023/08/20/windows-security-and-privacy/</id>
    <published>2023-08-20T14:10:00.000Z</published>
    <updated>2023-08-21T08:29:18.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;I guess for this article I will be again hanged, burned at the stake and executed by firing squad at the same time, but fortunately comments are disabled, so all ugly words and curses will not affect me directly. Also, please, do not think this is a step-by-step guide to make your system secure. It is just a general overview of what to do, and</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="windows privacy" scheme="http://0ut3r.space/tags/windows-privacy/"/>
    
    <category term="system hardening" scheme="http://0ut3r.space/tags/system-hardening/"/>
    
    <category term="system privacy" scheme="http://0ut3r.space/tags/system-privacy/"/>
    
    <category term="cis benchmarks" scheme="http://0ut3r.space/tags/cis-benchmarks/"/>
    
    <category term="Windows 11" scheme="http://0ut3r.space/tags/Windows-11/"/>
    
    <category term="system security" scheme="http://0ut3r.space/tags/system-security/"/>
    
  </entry>
  
  <entry>
    <title>Learning to hack</title>
    <link href="http://0ut3r.space/2023/07/24/learning-to-hack/"/>
    <id>http://0ut3r.space/2023/07/24/learning-to-hack/</id>
    <published>2023-07-24T16:38:00.000Z</published>
    <updated>2023-07-24T16:36:58.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Everyone wants to be a hacker. Just like that. For fame or for money, and preferably for both. I even heard being a SOC member is sexy.&lt;/p&gt;
&lt;p&gt;In 2019 I wrote an article &lt;a href=&quot;https://0ut3r.space/2019/05/31/ethical-hacking/&quot;&gt;Ethical Hacking - How to start&lt;/a&gt;. Check it as an introduction or supplement to this article.&lt;/p&gt;
&lt;p&gt;I work in IT</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="learning" scheme="http://0ut3r.space/tags/learning/"/>
    
    <category term="education" scheme="http://0ut3r.space/tags/education/"/>
    
    <category term="hacking" scheme="http://0ut3r.space/tags/hacking/"/>
    
    <category term="labs" scheme="http://0ut3r.space/tags/labs/"/>
    
    <category term="hand-on" scheme="http://0ut3r.space/tags/hand-on/"/>
    
    <category term="cyber security trainings" scheme="http://0ut3r.space/tags/cyber-security-trainings/"/>
    
  </entry>
  
  <entry>
    <title>Worth checking ep.1</title>
    <link href="http://0ut3r.space/2023/07/04/worth-checking-1/"/>
    <id>http://0ut3r.space/2023/07/04/worth-checking-1/</id>
    <published>2023-07-04T17:45:00.000Z</published>
    <updated>2023-12-17T17:33:39.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Welcome to the first article of never ending (or till I die) series called &lt;strong&gt;Worth checking&lt;/strong&gt; episode 1.&lt;/p&gt;
&lt;h2 id=&quot;Weird-introduction&quot;&gt;&lt;a href=&quot;#Weird-introduction&quot; class=&quot;headerlink&quot; title=&quot;Weird introduction&quot;&gt;&lt;/a&gt;Weird introduction&lt;/h2&gt;&lt;p&gt;Being a security researcher or pentester, red teamer, hacker, or other specialist in a</summary>
        
      
    
    
    
    <category term="resources" scheme="http://0ut3r.space/categories/resources/"/>
    
    
    <category term="worth checking" scheme="http://0ut3r.space/tags/worth-checking/"/>
    
    <category term="interesting materials" scheme="http://0ut3r.space/tags/interesting-materials/"/>
    
    <category term="interesting resources" scheme="http://0ut3r.space/tags/interesting-resources/"/>
    
    <category term="bookmarks" scheme="http://0ut3r.space/tags/bookmarks/"/>
    
    <category term="videos" scheme="http://0ut3r.space/tags/videos/"/>
    
    <category term="documents" scheme="http://0ut3r.space/tags/documents/"/>
    
  </entry>
  
  <entry>
    <title>Ads, analytics, comments, dns, privacy ...</title>
    <link href="http://0ut3r.space/2023/06/15/analytics/"/>
    <id>http://0ut3r.space/2023/06/15/analytics/</id>
    <published>2023-06-15T18:15:00.000Z</published>
    <updated>2023-06-15T18:23:45.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;In the past I tested &lt;a href=&quot;/2021/04/12/goaccess/&quot;&gt;GoAccess as solution to monitor page views, visitors activity and technology&lt;/a&gt;. I also compared it to the Google Analytics. When I wrote article about &lt;a href=&quot;/2023/05/02/anonymous-tor-phone/&quot;&gt;Anonymous Tor Phone&lt;/a&gt; I received one comment like:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;How fucking ironic is</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="analytics" scheme="http://0ut3r.space/tags/analytics/"/>
    
    <category term="umami" scheme="http://0ut3r.space/tags/umami/"/>
    
    <category term="google analytics" scheme="http://0ut3r.space/tags/google-analytics/"/>
    
    <category term="website stats" scheme="http://0ut3r.space/tags/website-stats/"/>
    
    <category term="ads" scheme="http://0ut3r.space/tags/ads/"/>
    
    <category term="adblocker" scheme="http://0ut3r.space/tags/adblocker/"/>
    
    <category term="privcy" scheme="http://0ut3r.space/tags/privcy/"/>
    
    <category term="dns" scheme="http://0ut3r.space/tags/dns/"/>
    
  </entry>
  
  <entry>
    <title>CVE-2023-32784 - KeePass</title>
    <link href="http://0ut3r.space/2023/05/22/cve-2023-32784/"/>
    <id>http://0ut3r.space/2023/05/22/cve-2023-32784/</id>
    <published>2023-05-22T18:33:00.000Z</published>
    <updated>2023-06-03T10:03:01.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;New interesting vulnerability &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32784&quot;&gt;CVE-2023-32784&lt;/a&gt; was discovered for &lt;a href=&quot;https://keepass.info/&quot;&gt;KeePass&lt;/a&gt; app last days. In this article I tested it, provided examples how to use it, and how to brute-force password vault with crafted dictionary attack. To not act as</summary>
        
      
    
    
    
    <category term="vulnerability" scheme="http://0ut3r.space/categories/vulnerability/"/>
    
    
    <category term="CVE-2023-32784" scheme="http://0ut3r.space/tags/CVE-2023-32784/"/>
    
    <category term="KeePass" scheme="http://0ut3r.space/tags/KeePass/"/>
    
    <category term="password dumper" scheme="http://0ut3r.space/tags/password-dumper/"/>
    
    <category term="master password" scheme="http://0ut3r.space/tags/master-password/"/>
    
    <category term="keepass bruteforce" scheme="http://0ut3r.space/tags/keepass-bruteforce/"/>
    
    <category term="bruteforce" scheme="http://0ut3r.space/tags/bruteforce/"/>
    
    <category term="dictionary attack" scheme="http://0ut3r.space/tags/dictionary-attack/"/>
    
  </entry>
  
  <entry>
    <title>Anonymous Tor Phone</title>
    <link href="http://0ut3r.space/2023/05/02/anonymous-tor-phone/"/>
    <id>http://0ut3r.space/2023/05/02/anonymous-tor-phone/</id>
    <published>2023-05-02T14:06:00.000Z</published>
    <updated>2023-06-03T10:03:34.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;I was always curious about all that bad guys (criminals, drug dealers, hitman’s, thief’s etc.) using not very good and secure communication channels. Forgetting about whole OPSEC stuff.  There is a lot of stories about mafia or other criminals where people get caught because of mobile phone tracking, or because using unencrypted communication.</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="tor phone" scheme="http://0ut3r.space/tags/tor-phone/"/>
    
    <category term="anonymous phone" scheme="http://0ut3r.space/tags/anonymous-phone/"/>
    
    <category term="privacy phone" scheme="http://0ut3r.space/tags/privacy-phone/"/>
    
    <category term="secure phone" scheme="http://0ut3r.space/tags/secure-phone/"/>
    
  </entry>
  
  <entry>
    <title>Server Upgrade</title>
    <link href="http://0ut3r.space/2023/04/25/server-upgrade/"/>
    <id>http://0ut3r.space/2023/04/25/server-upgrade/</id>
    <published>2023-04-25T09:38:00.000Z</published>
    <updated>2023-11-11T16:34:15.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;It’s hard to admit, but &lt;a href=&quot;https://0ut3r.space/&quot;&gt;0ut3r.space&lt;/a&gt; was running on Debian 9 (shame on me, on the 30 June 2022, Debian 9 “Stretch” went End of Life). A few days ago, I upgraded it to Debian 11. I thought it may be useful for someone to provide steps I did. Here it is, short article about upgrading 0ut3r.space from Debian 9 to</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="Debian Update" scheme="http://0ut3r.space/tags/Debian-Update/"/>
    
    <category term="Server Update" scheme="http://0ut3r.space/tags/Server-Update/"/>
    
    <category term="Debian from 9 to 11" scheme="http://0ut3r.space/tags/Debian-from-9-to-11/"/>
    
    <category term="Debian from 9 to 12" scheme="http://0ut3r.space/tags/Debian-from-9-to-12/"/>
    
  </entry>
  
  <entry>
    <title>How ChatGPT helped me to code stuff</title>
    <link href="http://0ut3r.space/2023/04/10/chatgpt/"/>
    <id>http://0ut3r.space/2023/04/10/chatgpt/</id>
    <published>2023-04-10T10:28:00.000Z</published>
    <updated>2023-06-03T10:03:45.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;As we live in the era of &lt;a href=&quot;meme_ai_simpson.jpg&quot;&gt;AI specialist everywhere&lt;/a&gt;, I thought ok lets do some experiment with ChatGPT, to become another &lt;a href=&quot;meme_ai_buzz.jpg&quot;&gt;AI specialist&lt;/a&gt;… nah I am too stupid to understand all the stuff with AI, but I love how it works, and I keep an eye on it since many years. I guess I do not need</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="chatgpt" scheme="http://0ut3r.space/tags/chatgpt/"/>
    
    <category term="coding" scheme="http://0ut3r.space/tags/coding/"/>
    
    <category term="upwork" scheme="http://0ut3r.space/tags/upwork/"/>
    
    <category term="AI" scheme="http://0ut3r.space/tags/AI/"/>
    
    <category term="artificial intelligence" scheme="http://0ut3r.space/tags/artificial-intelligence/"/>
    
  </entry>
  
  <entry>
    <title>Virtualenv</title>
    <link href="http://0ut3r.space/2023/03/13/virtualenv/"/>
    <id>http://0ut3r.space/2023/03/13/virtualenv/</id>
    <published>2023-03-13T17:15:00.000Z</published>
    <updated>2023-03-13T17:20:45.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Everyone who is using Kali Linux, also uses a lot of Python tools. If you have recently installed or updated something in the last few days you might have received an error like:&lt;/p&gt;
&lt;figure class=&quot;highlight bash&quot;&gt;&lt;table&gt;&lt;tr&gt;&lt;td class=&quot;gutter&quot;&gt;&lt;pre&gt;&lt;span class=&quot;line&quot;&gt;1&lt;/span&gt;&lt;br&gt;&lt;span class=&quot;line&quot;&gt;2&lt;/span&gt;&lt;br&gt;&lt;/pre&gt;&lt;/td&gt;&lt;td</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="kali" scheme="http://0ut3r.space/tags/kali/"/>
    
    <category term="externally managed environment" scheme="http://0ut3r.space/tags/externally-managed-environment/"/>
    
    <category term="pip error" scheme="http://0ut3r.space/tags/pip-error/"/>
    
    <category term="python virtualenv" scheme="http://0ut3r.space/tags/python-virtualenv/"/>
    
  </entry>
  
  <entry>
    <title>Healthy mind and body of hacker</title>
    <link href="http://0ut3r.space/2023/02/27/healthy-hacker/"/>
    <id>http://0ut3r.space/2023/02/27/healthy-hacker/</id>
    <published>2023-02-27T14:29:00.000Z</published>
    <updated>2023-03-13T15:57:29.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Yeah, tittle sounds a little like coach, who want to tell (sell) you how to live healthy. As this blog is my personal place, I would like to mix sometimes technical topics with the reflections on life, and tips for other people like me. I got a lot of questions, how to become a hacker, where to find a knowledge, how to develop skills and other</summary>
        
      
    
    
    
    <category term="hobby" scheme="http://0ut3r.space/categories/hobby/"/>
    
    
    <category term="mind and body" scheme="http://0ut3r.space/tags/mind-and-body/"/>
    
    <category term="healthy hacker" scheme="http://0ut3r.space/tags/healthy-hacker/"/>
    
    <category term="healthy IT" scheme="http://0ut3r.space/tags/healthy-IT/"/>
    
  </entry>
  
  <entry>
    <title>Penetration test report template</title>
    <link href="http://0ut3r.space/2023/01/29/pentest-report-template/"/>
    <id>http://0ut3r.space/2023/01/29/pentest-report-template/</id>
    <published>2023-01-29T17:13:00.000Z</published>
    <updated>2023-01-29T17:12:41.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;No matter if you are experienced penetration tester, or beginner red teamer, if you have technical skills better than anyone on earth, or you’re just a script kiddie. All what maters is how you will present your findings. Especially if you are not only a bug hunter, but when you work in a corporation, and the results of your test needs to be</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="penetration test report" scheme="http://0ut3r.space/tags/penetration-test-report/"/>
    
    <category term="report template" scheme="http://0ut3r.space/tags/report-template/"/>
    
    <category term="pt report template" scheme="http://0ut3r.space/tags/pt-report-template/"/>
    
  </entry>
  
  <entry>
    <title>End of the...</title>
    <link href="http://0ut3r.space/2022/12/31/end-of-the/"/>
    <id>http://0ut3r.space/2022/12/31/end-of-the/</id>
    <published>2022-12-31T10:44:00.000Z</published>
    <updated>2022-12-31T10:43:13.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;…year :P&lt;/p&gt;
&lt;p&gt;Howdy!&lt;/p&gt;
&lt;p&gt;As this is the last day in 2022, I decided to share some thoughts, about my website, projects, upcoming ideas, even about myself and also, to say sorry that there was no post last month. No worries dear readers, I do not close the website or end sharing what I know, this is no “good bye” article. I just had to take</summary>
        
      
    
    
    
    <category term="hobby" scheme="http://0ut3r.space/categories/hobby/"/>
    
    
    <category term="summary" scheme="http://0ut3r.space/tags/summary/"/>
    
    <category term="ideas" scheme="http://0ut3r.space/tags/ideas/"/>
    
    <category term="plans" scheme="http://0ut3r.space/tags/plans/"/>
    
  </entry>
  
  <entry>
    <title>Security Roadmap</title>
    <link href="http://0ut3r.space/2022/10/31/security-roadmap/"/>
    <id>http://0ut3r.space/2022/10/31/security-roadmap/</id>
    <published>2022-10-31T21:03:00.000Z</published>
    <updated>2022-10-31T21:01:20.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Today I’ll share with you my thoughts on a career in IT security and give some hints on how to get started.&lt;/p&gt;
&lt;p&gt;People fresh out of IT-related studies, or those who are just going to study IT more or less know what they want to do or will learn from lecturers and colleagues. More difficult is for those who change their careers completely.</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="security roadmap" scheme="http://0ut3r.space/tags/security-roadmap/"/>
    
    <category term="certs" scheme="http://0ut3r.space/tags/certs/"/>
    
    <category term="cyber roadmap" scheme="http://0ut3r.space/tags/cyber-roadmap/"/>
    
    <category term="cyber security career" scheme="http://0ut3r.space/tags/cyber-security-career/"/>
    
  </entry>
  
  <entry>
    <title>Downloading big files from Tor</title>
    <link href="http://0ut3r.space/2022/09/30/big-files-from-tor/"/>
    <id>http://0ut3r.space/2022/09/30/big-files-from-tor/</id>
    <published>2022-09-30T18:45:00.000Z</published>
    <updated>2024-01-28T18:12:59.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Some time ago I had to download some large files from the website, of one of the ransomware groups, in order to analyze the published (stolen) data. The leak was huge, hundreds of gigabytes, split in many large files and all published on the website hosted in Tor network.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/2022/09/30/big-files-from-tor/downloading.jpg&quot;</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="curl tor download" scheme="http://0ut3r.space/tags/curl-tor-download/"/>
    
    <category term="download leaked data" scheme="http://0ut3r.space/tags/download-leaked-data/"/>
    
    <category term="tor huge files" scheme="http://0ut3r.space/tags/tor-huge-files/"/>
    
  </entry>
  
  <entry>
    <title>Short story about my Steam Deck</title>
    <link href="http://0ut3r.space/2022/08/25/steam-deck/"/>
    <id>http://0ut3r.space/2022/08/25/steam-deck/</id>
    <published>2022-08-25T08:50:00.000Z</published>
    <updated>2022-08-25T08:48:18.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Hello 0ut3r Space visitors! Today short article about my Steam Deck. Last year I preordered &lt;a href=&quot;https://store.steampowered.com/steamdeck&quot;&gt;highest version&lt;/a&gt; (512GB NVMe SSD) and on 27th of June it arrived! Of course with my luck it has screen issue and I had to send it back and wait for exchange. About two weeks later I received new one,</summary>
        
      
    
    
    
    <category term="entertainment" scheme="http://0ut3r.space/categories/entertainment/"/>
    
    
    <category term="steam deck" scheme="http://0ut3r.space/tags/steam-deck/"/>
    
    <category term="valve" scheme="http://0ut3r.space/tags/valve/"/>
    
    <category term="console" scheme="http://0ut3r.space/tags/console/"/>
    
  </entry>
  
  <entry>
    <title>I am not that hacker you are looking for</title>
    <link href="http://0ut3r.space/2022/08/08/i-am-not/"/>
    <id>http://0ut3r.space/2022/08/08/i-am-not/</id>
    <published>2022-08-08T12:43:00.000Z</published>
    <updated>2022-08-08T12:43:15.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This article is an information for people who bother me on various groups, social media and messengers. And also for the people who doesn’t understand who am I and what about is this website. It’s not that I don’t like to give a hint or discuss something with someone, but let’s get a few things straight, for the sake of respecting my time and</summary>
        
      
    
    
    
    <category term="hobby" scheme="http://0ut3r.space/categories/hobby/"/>
    
    
    <category term="go away" scheme="http://0ut3r.space/tags/go-away/"/>
    
    <category term="readme" scheme="http://0ut3r.space/tags/readme/"/>
    
    <category term="I am not a hacker" scheme="http://0ut3r.space/tags/I-am-not-a-hacker/"/>
    
    <category term="hacker" scheme="http://0ut3r.space/tags/hacker/"/>
    
  </entry>
  
  <entry>
    <title>Cool Command Line Apps for Linux</title>
    <link href="http://0ut3r.space/2022/07/31/cool-cmd-apps/"/>
    <id>http://0ut3r.space/2022/07/31/cool-cmd-apps/</id>
    <published>2022-07-31T11:50:00.000Z</published>
    <updated>2022-07-31T11:46:03.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Using system text console, you can do everything. Each system has it own commands and tools. It is amazing how developers building great command line apps that fully replace graphical user interface.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/2022/07/31/cool-cmd-apps/command-line-apps.jpg&quot; alt=&quot;Command Line Apps&quot;&gt;&lt;/p&gt;
&lt;p&gt;Today I will show you very cool command line</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="command line" scheme="http://0ut3r.space/tags/command-line/"/>
    
    <category term="Linux" scheme="http://0ut3r.space/tags/Linux/"/>
    
    <category term="tools" scheme="http://0ut3r.space/tags/tools/"/>
    
  </entry>
  
  <entry>
    <title>Let&#39;s hack some SMB</title>
    <link href="http://0ut3r.space/2022/06/16/smb-hacking/"/>
    <id>http://0ut3r.space/2022/06/16/smb-hacking/</id>
    <published>2022-06-16T17:20:00.000Z</published>
    <updated>2022-06-16T17:31:02.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Server_Message_Block&quot;&gt;Server Message Block (SMB)&lt;/a&gt;, also known as Common Internet File System (CIFS), is a network protocol mainly used for providing shared access to files, printers, serial ports and miscellaneous communications between nodes on a network.&lt;/p&gt;
&lt;p&gt;Versions of Windows SMB&lt;br&gt;CIFS: The old</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="hacking" scheme="http://0ut3r.space/tags/hacking/"/>
    
    <category term="samba" scheme="http://0ut3r.space/tags/samba/"/>
    
    <category term="smb" scheme="http://0ut3r.space/tags/smb/"/>
    
    <category term="network shares" scheme="http://0ut3r.space/tags/network-shares/"/>
    
    <category term="lsass" scheme="http://0ut3r.space/tags/lsass/"/>
    
    <category term="hash" scheme="http://0ut3r.space/tags/hash/"/>
    
  </entry>
  
  <entry>
    <title>Xubuntu as custom Whonix workstation</title>
    <link href="http://0ut3r.space/2022/05/05/xubuntu-whonix/"/>
    <id>http://0ut3r.space/2022/05/05/xubuntu-whonix/</id>
    <published>2022-05-05T11:08:00.000Z</published>
    <updated>2022-05-05T11:04:08.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;If you are a &lt;a href=&quot;https://www.whonix.org/&quot;&gt;Whonix&lt;/a&gt; user this guide may be useful for you. Sometimes when I want to torify whole traffic from a virtual system I am using Whonix Gateway virtual machine. For people who haven’t use Whonix yet here is a short description with links:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Whonix ™ consists of two VMs: the &lt;a</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="whonix" scheme="http://0ut3r.space/tags/whonix/"/>
    
    <category term="xubuntu" scheme="http://0ut3r.space/tags/xubuntu/"/>
    
    <category term="whonix workstation" scheme="http://0ut3r.space/tags/whonix-workstation/"/>
    
    <category term="whonix network settings" scheme="http://0ut3r.space/tags/whonix-network-settings/"/>
    
    <category term="firefox hardening" scheme="http://0ut3r.space/tags/firefox-hardening/"/>
    
  </entry>
  
  <entry>
    <title>MS Designer keyboard right control key</title>
    <link href="http://0ut3r.space/2022/05/04/ms-designer-ctrl/"/>
    <id>http://0ut3r.space/2022/05/04/ms-designer-ctrl/</id>
    <published>2022-05-04T18:45:00.000Z</published>
    <updated>2023-08-02T13:16:37.317Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Sometimes simple things require complex solutions. Today’s article is sponsored by Right Control key.&lt;/p&gt;
&lt;p&gt;Funny situation… some time ago I bought another keyboard, this time &lt;a href=&quot;https://www.microsoft.com/en-us/d/microsoft-designer-compact-keyboard/8zhrtr7zcswq?rtc=3&amp;activetab=pivot:overviewtab&quot;&gt;Microsoft Designer Compact Keyboard&lt;/a&gt;.</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="ms designer keyboard" scheme="http://0ut3r.space/tags/ms-designer-keyboard/"/>
    
    <category term="microsoft designer" scheme="http://0ut3r.space/tags/microsoft-designer/"/>
    
    <category term="right ctrl" scheme="http://0ut3r.space/tags/right-ctrl/"/>
    
    <category term="ctrl" scheme="http://0ut3r.space/tags/ctrl/"/>
    
  </entry>
  
  <entry>
    <title>Ransomware simulation</title>
    <link href="http://0ut3r.space/2022/04/18/ransomware-simulation/"/>
    <id>http://0ut3r.space/2022/04/18/ransomware-simulation/</id>
    <published>2022-04-18T13:05:00.000Z</published>
    <updated>2022-04-18T13:03:33.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;In one company my boss asked me: “hey, is it possible to check whether we are well protected against ransomware, and whether we are able to detect infected devices, so that we can isolate them from the network fairly quickly?” &lt;/p&gt;
&lt;p&gt;When a manager asks you a question like that, you know the next month is going to be tough.&lt;/p&gt;
&lt;p&gt;I’ve spent</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="ransomware" scheme="http://0ut3r.space/tags/ransomware/"/>
    
    <category term="simulation" scheme="http://0ut3r.space/tags/simulation/"/>
    
    <category term="siem" scheme="http://0ut3r.space/tags/siem/"/>
    
    <category term="edr" scheme="http://0ut3r.space/tags/edr/"/>
    
    <category term="dlp" scheme="http://0ut3r.space/tags/dlp/"/>
    
  </entry>
  
  <entry>
    <title>Windows Defender is enough, if you harden it</title>
    <link href="http://0ut3r.space/2022/03/06/windows-defender/"/>
    <id>http://0ut3r.space/2022/03/06/windows-defender/</id>
    <published>2022-03-06T19:25:00.000Z</published>
    <updated>2022-03-07T08:06:30.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This article is not intended to convince you to abandon your current antivirus solutions. In this post I would like to share my observations and ways to improve the effectiveness of Defender.&lt;/p&gt;
&lt;p&gt;You don’t need to buy expensive antivirus software. If you are a standard user, surfing the web, you don’t want to install additional software (eg.</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="windows defender" scheme="http://0ut3r.space/tags/windows-defender/"/>
    
    <category term="setup windows defender" scheme="http://0ut3r.space/tags/setup-windows-defender/"/>
    
    <category term="antivirus" scheme="http://0ut3r.space/tags/antivirus/"/>
    
  </entry>
  
  <entry>
    <title>CMS Vulnerability Scanners</title>
    <link href="http://0ut3r.space/2022/02/26/cms-vulnerability-scanners/"/>
    <id>http://0ut3r.space/2022/02/26/cms-vulnerability-scanners/</id>
    <published>2022-02-26T16:52:00.000Z</published>
    <updated>2022-02-26T16:51:01.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;CMS (&lt;a href=&quot;https://en.wikipedia.org/wiki/Content_management_system&quot;&gt;Content Management System&lt;/a&gt;) is very popular, easy to install and mostly setup once and forget by “admins”.&lt;/p&gt;
&lt;p&gt;In general, there are quite serious vulnerabilities in popular CMS, as is the case with any software. Bugs are patched fairly quickly. Responsible companies</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="vulnerability" scheme="http://0ut3r.space/tags/vulnerability/"/>
    
    <category term="wordpress" scheme="http://0ut3r.space/tags/wordpress/"/>
    
    <category term="joomla" scheme="http://0ut3r.space/tags/joomla/"/>
    
    <category term="drupal" scheme="http://0ut3r.space/tags/drupal/"/>
    
    <category term="moodle" scheme="http://0ut3r.space/tags/moodle/"/>
    
    <category term="cms scanner" scheme="http://0ut3r.space/tags/cms-scanner/"/>
    
  </entry>
  
  <entry>
    <title>CVE-2021-4034 - gimme root</title>
    <link href="http://0ut3r.space/2022/01/26/cve-2021-4034/"/>
    <id>http://0ut3r.space/2022/01/26/cve-2021-4034/</id>
    <published>2022-01-26T19:52:00.000Z</published>
    <updated>2022-01-26T19:54:03.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Hell yeah! Finally, new category on 0ut3r Space! This is the first article in &lt;a href=&quot;/categories/vulnerability/&quot;&gt;vulnerability&lt;/a&gt; category. I’ve been planning this for some time. I will describe shortly the most spectacular, popular and interesting vulnerabilities from perspective of blue and red teams, with some examples. Let start with</summary>
        
      
    
    
    
    <category term="vulnerability" scheme="http://0ut3r.space/categories/vulnerability/"/>
    
    
    <category term="CVE-2021-4034" scheme="http://0ut3r.space/tags/CVE-2021-4034/"/>
    
    <category term="PwnKit" scheme="http://0ut3r.space/tags/PwnKit/"/>
    
    <category term="polkit" scheme="http://0ut3r.space/tags/polkit/"/>
    
    <category term="pkexec" scheme="http://0ut3r.space/tags/pkexec/"/>
    
    <category term="PolicyKit" scheme="http://0ut3r.space/tags/PolicyKit/"/>
    
  </entry>
  
  <entry>
    <title>A little bit about Nmap</title>
    <link href="http://0ut3r.space/2021/12/21/nmap/"/>
    <id>http://0ut3r.space/2021/12/21/nmap/</id>
    <published>2021-12-21T17:45:00.000Z</published>
    <updated>2023-10-14T07:27:37.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;a href=&quot;https://nmap.org/&quot;&gt;Nmap&lt;/a&gt; is powerful tool. Mostly used for network discovery and security auditing. If you want to know more about what assets are in your network and what services they are running, Nmap is best choice. I will also describe few other similar tools like &lt;a href=&quot;https://linux.die.net/man/1/arp-scan&quot;&gt;arp-scan&lt;/a&gt; or</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="nmap" scheme="http://0ut3r.space/tags/nmap/"/>
    
    <category term="network scan" scheme="http://0ut3r.space/tags/network-scan/"/>
    
    <category term="network discovery" scheme="http://0ut3r.space/tags/network-discovery/"/>
    
  </entry>
  
  <entry>
    <title>Black Friday - Cyber Monday</title>
    <link href="http://0ut3r.space/2021/11/22/black-friday/"/>
    <id>http://0ut3r.space/2021/11/22/black-friday/</id>
    <published>2021-11-22T12:13:00.000Z</published>
    <updated>2023-06-03T10:02:12.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Just  short info for all cybersecurity fans.&lt;/p&gt;
&lt;p&gt;The day of the year is coming, when people kill each other in shop lines and tread on the way to dream material goods. The American craze of promotion, pointless spending of money on something that we do not need at all, but it is cheap. Willingness to possess, materialism and other wise</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="black Friday" scheme="http://0ut3r.space/tags/black-Friday/"/>
    
    <category term="cyber Monday" scheme="http://0ut3r.space/tags/cyber-Monday/"/>
    
    <category term="gifts for pentesters" scheme="http://0ut3r.space/tags/gifts-for-pentesters/"/>
    
  </entry>
  
  <entry>
    <title>Useful Linux Commands</title>
    <link href="http://0ut3r.space/2021/10/30/useful-linux-commands/"/>
    <id>http://0ut3r.space/2021/10/30/useful-linux-commands/</id>
    <published>2021-10-30T16:15:00.000Z</published>
    <updated>2023-12-14T14:40:05.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;There is a lot of infographics about basic Linux commands. They are useful to start journey with Linux terminal. In this article I will show you basic commands with their extended usage and how I am using them. Using &lt;code&gt;ls -l&lt;/code&gt;  command with basic parameter is cool for directory listing, but it can do a lot more! &lt;/p&gt;
&lt;p&gt;&lt;img</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="Linux commands" scheme="http://0ut3r.space/tags/Linux-commands/"/>
    
    <category term="Linux tricks" scheme="http://0ut3r.space/tags/Linux-tricks/"/>
    
    <category term="bash commands" scheme="http://0ut3r.space/tags/bash-commands/"/>
    
  </entry>
  
  <entry>
    <title>How to report a vulnerability and not go to jail</title>
    <link href="http://0ut3r.space/2021/09/28/how-to-report-vulnerability/"/>
    <id>http://0ut3r.space/2021/09/28/how-to-report-vulnerability/</id>
    <published>2021-09-28T18:35:00.000Z</published>
    <updated>2021-09-28T18:34:59.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This article is more like something to think about rather than technical guide. It contains my thoughts with which you do not necessarily agree, but I will be happy to hear your opinion, maybe I will be able to improve my approach on the subject.&lt;/p&gt;
&lt;p&gt;The topic may seem simple in general. You find a bug, a hole, a vulnerability. You report it</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="vulnerability" scheme="http://0ut3r.space/tags/vulnerability/"/>
    
    <category term="report bug" scheme="http://0ut3r.space/tags/report-bug/"/>
    
    <category term="bug bounty program" scheme="http://0ut3r.space/tags/bug-bounty-program/"/>
    
    <category term="good intentions" scheme="http://0ut3r.space/tags/good-intentions/"/>
    
    <category term="hacking is not a crime" scheme="http://0ut3r.space/tags/hacking-is-not-a-crime/"/>
    
    <category term="port scanning is not a crime" scheme="http://0ut3r.space/tags/port-scanning-is-not-a-crime/"/>
    
  </entry>
  
  <entry>
    <title>Yet Another Ridiculous Acronym</title>
    <link href="http://0ut3r.space/2021/08/26/yara/"/>
    <id>http://0ut3r.space/2021/08/26/yara/</id>
    <published>2021-08-26T10:50:00.000Z</published>
    <updated>2021-08-26T10:49:33.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;a href=&quot;https://virustotal.github.io/yara/&quot;&gt;Yara&lt;/a&gt; is mostly recognized as a tool to detect, identify and classify malware samples. In general it allows you to identify any binary or textual pattern, such as hexadecimal and strings contained within a file. If you started your journey, as a SOC member, sooner or later you will need to know</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="malware" scheme="http://0ut3r.space/tags/malware/"/>
    
    <category term="yara" scheme="http://0ut3r.space/tags/yara/"/>
    
    <category term="binary patterns" scheme="http://0ut3r.space/tags/binary-patterns/"/>
    
    <category term="boolean expression" scheme="http://0ut3r.space/tags/boolean-expression/"/>
    
    <category term="strings" scheme="http://0ut3r.space/tags/strings/"/>
    
  </entry>
  
  <entry>
    <title>Remote connection for Linux</title>
    <link href="http://0ut3r.space/2021/07/25/remote-connection-linux/"/>
    <id>http://0ut3r.space/2021/07/25/remote-connection-linux/</id>
    <published>2021-07-25T13:37:00.000Z</published>
    <updated>2021-07-25T13:38:18.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Remote connection for Windows is pretty easy. Built in RDP server and client allows you to connect to remote Windows machine without any additional software. It is of course not too safe, to allow remote connection from the Internet, without any additional security layer, but this is not the topic for today. Today we are talking about local</summary>
        
      
    
    
    
    <category term="guides" scheme="http://0ut3r.space/categories/guides/"/>
    
    
    <category term="linux" scheme="http://0ut3r.space/tags/linux/"/>
    
    <category term="remote desktop" scheme="http://0ut3r.space/tags/remote-desktop/"/>
    
    <category term="remote connection" scheme="http://0ut3r.space/tags/remote-connection/"/>
    
    <category term="vnc server" scheme="http://0ut3r.space/tags/vnc-server/"/>
    
  </entry>
  
  <entry>
    <title>Linux laptops</title>
    <link href="http://0ut3r.space/2021/06/15/linux-laptops/"/>
    <id>http://0ut3r.space/2021/06/15/linux-laptops/</id>
    <published>2021-06-15T15:25:00.000Z</published>
    <updated>2021-07-11T10:07:09.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;I started from desktop machines, like everyone who was born in 1980’s. I was tired of desktop computers and Windows operating system, wanted to have small notebook with Linux. After many years my first laptop was, used &lt;a href=&quot;https://www.notebookcheck.net/Review-Dell-Vostro-V131-Notebook.60602.0.html&quot;&gt;Dell Vostro V131&lt;/a&gt; with Intel Core i3,</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="Linux laptops" scheme="http://0ut3r.space/tags/Linux-laptops/"/>
    
    <category term="Linux notebooks" scheme="http://0ut3r.space/tags/Linux-notebooks/"/>
    
    <category term="Linux dedicated laptops" scheme="http://0ut3r.space/tags/Linux-dedicated-laptops/"/>
    
    <category term="privacy notebooks" scheme="http://0ut3r.space/tags/privacy-notebooks/"/>
    
  </entry>
  
  <entry>
    <title>OS, apps and services for privacy and anonymity</title>
    <link href="http://0ut3r.space/2021/06/07/privacy-and-anonymity/"/>
    <id>http://0ut3r.space/2021/06/07/privacy-and-anonymity/</id>
    <published>2021-06-07T13:25:00.000Z</published>
    <updated>2021-06-07T13:31:20.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;There are few systems that ensure privacy. Even fewer of those who ensures anonymity. Even when we configure our system well, we must remember about the right application selection, so that our entire secure configuration is not compromised by one unfortunate program. We must also remember about our own behavior on the Internet and what we put</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="privacy" scheme="http://0ut3r.space/tags/privacy/"/>
    
    <category term="anonymity" scheme="http://0ut3r.space/tags/anonymity/"/>
    
    <category term="operating systems" scheme="http://0ut3r.space/tags/operating-systems/"/>
    
    <category term="whonix" scheme="http://0ut3r.space/tags/whonix/"/>
    
    <category term="tails" scheme="http://0ut3r.space/tags/tails/"/>
    
    <category term="qubes os" scheme="http://0ut3r.space/tags/qubes-os/"/>
    
  </entry>
  
  <entry>
    <title>Backup your data</title>
    <link href="http://0ut3r.space/2021/05/18/backup-your-data/"/>
    <id>http://0ut3r.space/2021/05/18/backup-your-data/</id>
    <published>2021-05-18T13:23:00.000Z</published>
    <updated>2023-06-03T10:01:22.000Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Few months ago I bought &lt;a href=&quot;https://www.synology.com/en-global/products/DS720+&quot;&gt;Synology DiskStation DS720+&lt;/a&gt;. I was using Synology DS218j for about 5 years and wanted to buy something more efficient. This article is a small review and a reminder for you to backup your data. If you think about NAS, you care about your data, and you want</summary>
        
      
    
    
    
    <category term="reviews" scheme="http://0ut3r.space/categories/reviews/"/>
    
    
    <category term="synology" scheme="http://0ut3r.space/tags/synology/"/>
    
    <category term="diskstation" scheme="http://0ut3r.space/tags/diskstation/"/>
    
    <category term="nas" scheme="http://0ut3r.space/tags/nas/"/>
    
    <category term="ds720+" scheme="http://0ut3r.space/tags/ds720/"/>
    
    <category term="backup" scheme="http://0ut3r.space/tags/backup/"/>
    
    <category term="owncloud" scheme="http://0ut3r.space/tags/owncloud/"/>
    
  </entry>
  
</feed>
