VirtualBox Raw Disk Access & Booting from Real Partitions
More from Blog - joeeey
For a variety of reasons, device and software manufacturers implement various levels of restrictions to prevent users from accessing saved WiFi keys. On Android (depending on your device model/software) you may be able to access the key for an individual access point, or share this information via a QR code. This data may even be included when...
Docker is not inherently secure by default, especially since the daemon-container architecture runs as root by default. There are many ways you can significantly limit the consequences of an attack should one compromise your system via your services/containers. This post served as my guide when getting started with self-hosting. This list is in...
To increase security you should be using rootless Docker where you can. As written by Jake Howard: Docker containers, and containers as a whole, are really just a regular program wrapped in some extra protections provided by the kernel (namely cgroups etc) to create isolation, and other interesting features. Unlike VMs, containers run closer to...
Android Auto for Phone Screens was a feature provided by Google for Android smartphones. It allowed users to access a simplified version of the Android Auto interface directly on their phone's screen, without the need for a compatible car infotainment system. In essence, it allowed you to use Android Auto's features and interface while using your...
Emails are an important part of many of our lives - both personally and professionally. Staying on top of your inbox can be a daunting task. My matter how hard I try, inevitably my Gmail begins overflowing with countless unread messages. In this guide we will explore how Python can be utilized to effortlessly sort through your inbox, allowing you...