Okay, I’ll admit it, I was rage-baited into writing this article. Lately, I’ve been spending some time automating all of my LinkedIn tasks. I don’t actually like LinkedIn, but I do want to build a large network. So what’s a guy to do? Obviously, connect ChatGPT to LinkedIn. Now, let’s be clear: this is a…
How I hacked dozens of WMF coffee machines using social engineering, default PINs, and a bit of boldness. A fun real-world red teaming story—from free coffee to security awareness.
Disclaimer: The information provided on this blog is for educational purposes only. The use of hacking tools discussed here is at your own risk. For the full disclaimer, please click here. A while ago, I got invited by a large corporation to visit their offices in Krakow. I got lucky since all the hotels were full,…
Disclaimer: The information provided on this blog is for educational purposes only. The use of hacking tools discussed here is at your own risk. For the full disclaimer, please click here. Like most enterprises—or any business, really—you probably have multiple email security appliances. Sometimes these are part of your provider package like in Google Workspace. Typically,…
The journey to bringing you this guide was paved with rage and hardship. Before we go any further, let me be clear: local AI is nowhere near as good as ChatGPT or similar online tools. Without solid prompt engineering, you’ll mostly get weird, useless responses. That said, DeepSeek-R1 (32B) is hands down the best local…
Hey there 👋 Since you’re reading this, chances are you’ve got some chaos brewing in your brain—I love it. For legal reasons I must kindly ask you to read and actually understand my disclaimer. Disclaimer: The information provided on this blog is for educational purposes only. The use of hacking tools discussed here is at…
Passwords have been the cornerstone of online security for decades, but let’s face it: they’re far from perfect. Whether it’s phishing attacks, password leaks, or the sheer frustration of remembering dozens of them, passwords are a weak link in our digital lives. Enter passkeys—a revolutionary way to log in online that promises better security, more convenience,…
Securing a WordPress hosting setup requires more than just the basics—it’s about creating a layered defense to protect your server and adapt to emerging threats. Today I am going to show you what I do to keep Karlcom hosted systems secure from outside attackers. Firewall Restriction To minimize exposure, my server only accepts traffic from…
Hardware RAM My server is equipped with a total of 128GB of DDR5 RAM, made up of two Kingston FURY Beast kits (each consisting of 2 x 32GB, 6000 MHz, DDR5-RAM, DIMM). The RAM operates at around 3600 MHz and consistently maintains 32GB in active usage: Cooling I kept the fan coolers as they were…
Today, I want to walk you through how I handle backups for my home server. My primary method is using Proxmox’s built-in backup functionality, which I then sync to a Hetzner Storage Box for added security. When it comes to updates, I like to live on the edge. I enable automatic (security) updates on nearly…