Sort your email with a ten line Python program. It logs into your IMAP mailbox and moves list messages to list/ folder.| terokarvinen.com
Build your own robots, hack computers (legally) and admin Linux boxes - hundreds of them!| terokarvinen.com
Debian 13-Trixie was installed as a virtual machine on a Debian Linux host. On Linux hosts, virt-manager is fast and stable option. For Debian hosts, it's easy to install with apt-get. Hundreds of Linux learners have installed Linux using versions of this guide since 2021. Could I have it as a 15-second Tik-Tok dance? There is a very short list of steps in the end. Overview To install Linux on a virtual machine: Download installation iso-image Install virtualization software (virt-manager) an...| 2021s
Application hacking and vulnerabilities. In Finnish. Teaching together with Lari Iso-Anttila. Fully booked, queue started. Course name and codeSovellusten hakkerointi ja haavoittuvuudet ICI012AS3A-3002 Translated nameApplication hacking and vulnerabilities Study guideICI012AS3A course description, realization ICI012AS3A-3001 Timing2025 period 1, early autumn (w34-w41) (agenda) Credits5 cr ClassesPasila, classroom pa5001, bring your laptop Max students30 (sold out) LanguageFinnish (+reading ma...| 2021s
Learn to manage your own Linux server – in 8 weeks. 100% remote. Weekly video conference + a lot of individual work. Beginners welcome. Excellent feedback. In Finnish. Course name and code:Linux palvelimet ICI003AS2A-3014 (course description in study guide) Timing2025 period 1, early autumn, weeks w34-w41 Credits5 cr ClassesWed 17:40 - 20:30 online, mandatory participation (agenda) Max students50 LanguageFinnish (+reading material in English) RemoteYes, fully remote Feedback4.55* / 5 Excell...| 2021s
Learn to hack computers to protect your own. In the course, you will break into target computers. Update: We have four great visitors coming, check agenda. Excellent feedback, reached 5.0 out of 5.| terokarvinen.com
Spell checking plugin for micro editor. Fast even with book-sized documents. https://github.com/terokarvinen/speltti Alpha quality, vibe coded, and only works with development version of micro.| terokarvinen.com
2023s| terokarvinen.com
pentest| terokarvinen.com
MySQL is the most popular multi-user database. | terokarvinen.com
PostgreSQL is a popular database used often with Python Django, Python Flask and many other frameworks. It’s known for reliability and being very ACID.| terokarvinen.com
Logging is tells you what’s going on when your run and often avoids useless comments. Log messages give you a real time feeling what’s happening in the program. And your advanced users might want to run ‘supercommand –debug’, too. | terokarvinen.com
Install Debian Linux on VirtualBox. You can play with Linux even on Windows, before you completely move to Linux. This is a beginner friendly tutorial, with quazillion screenshots.| terokarvinen.com
Web servers often have secret directories, not linked from anywhere. You could find them by trying different paths manually: /secret, /.svn /admin. This article shows you how fuff can do this to you automatically. For practice, I coded a target that you can run locally, without Internet. I will also tell you the solution, so you can test your environment. As bonus, there is a challenge target where you can find to solution yourself.| terokarvinen.com
Network interface is almost a like a "network card". Except it's not necessarily a physical card. This short article tells you what names (like wlp4s and enp1s0) mean. These are the new names used by Debian and other systemd distros. Network interfaces Network interface is almost a like a "network card". Except it's not necessarily a physical card. For example, all computers have the loopback interface for localhost. Obviously, there is no physical card in your computer for localhost. Linux n...| 2021s
Wireshark is the leading network sniffer and analyzer. In this article, you'll learn to install Wireshark on Debian Linux. You'll capture traffic and view statistics. Finally, you'll use display filters to extract DNS name queries and HTTP web surfing. Working in Linux We'll use Debian in this article. It's probably easy to adapt this to other Debian-based distros, such as Kali, Ubuntu and Raspbian. If you don't have Debian yet, you can install Debian on virtual machine. This article assumes ...| 2021s
Learn to hack computers to protect your own. In the course, you will break into target computers. Excellent feedback, reached 5.0 out of 5. . Update: And latest instance just got 4.9/5 feedback, with 100% NPS. Enroll 2024-05-15 w20 Wednesday at 08:00 in MyNet / Peppi.| terokarvinen.com
You will be automacally redirected to newsletter subscription form.| terokarvinen.com
New course in autumn! Application hacking and vulnerabilities. In Finnish. Teaching together with Lari Iso-Anttila. Enrollment starts 2024-05-15 w20 Wed at 08:00.Sold out , queue started. Please join un next year!| terokarvinen.com
Create your own project with your team. You'll get the whole 10 cr to build your own project. Previous student projects: evil USB keyboard, AI log analysis, physical access control, encrypted communications with free software, machine vision... What will you build? Course name and code:ICT Infrastructure project pro4tf023-3011 and ICT-infrastruktuurit - Projekti pro4tn004-3002 Timing2025 whole spring, periods p3 and p4. Credits10 cr ClassesBlended: physical meetings in timetable + working wee...| 2021s
Understand adversarial view on security. Recognize key concepts of security. Be able to safely practice hands-on with security tools. Face-to-face in a real life classroom. In English. Course name and code:Information Security ICI002AS2AE-3004 Timing2025 period 3, early spring, w03-w11, not w08 Credits5 cr ClassesTuesdays 11:00 - 13:45, in Pasila pa5001, bring your laptop Max students30 LanguageEnglish TypeContact, in physical classroom, mandatory participation [as requested] Feedback4.8 / 5 ...| 2021s
Tips for the first few challenges in Cryptopals. Learn to break encryption. No math degree required. You do have to be able to code, though.| terokarvinen.com
Micro editor is a text editor for coders. It's probably the easiest TUI (text user interface) editor to start, but provides extensive features for programmers. Learn how to start your journey with micro!| terokarvinen.com
Review some Python basics to make hacking more convenient. Debugger giving you numbers (84) but you want letters ('T')? This is about Python basics for supporting hacking. It can support your static analysis with Ghidra, debugging with GDB and ̣getting started with crypto hacking with Cryptopals. I do have many articles on hacking, too.| terokarvinen.com
Hack two web apps. Then fix the vulnerabilites.| terokarvinen.com
Keep your calendar in a plain text file. Calendar.txt is versionable, supports all operating systems and easily syncs with Android mobile phone.| terokarvinen.com