Compare commits
9 Commits
8c536089b1
...
abbde66cae
| Author | SHA1 | Date | |
|---|---|---|---|
| abbde66cae | |||
| c2d2cc3360 | |||
| e34e6eada3 | |||
| 2685d0f829 | |||
| ead7fc5408 | |||
| c217bfb39a | |||
| 24acf79b10 | |||
| 939af0db20 | |||
| eb3959805f |
6
content/categories/_index.md
Normal file
6
content/categories/_index.md
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
author: Hyperling
|
||||||
|
title: "All Categories"
|
||||||
|
---
|
||||||
|
|
||||||
|
Categories attributed to recent articles. You may also [view all articles by date here](/posts).
|
||||||
@@ -4,4 +4,4 @@ title: "All Posts"
|
|||||||
subtitle: "Chronologically posted articles."
|
subtitle: "Chronologically posted articles."
|
||||||
---
|
---
|
||||||
|
|
||||||
Articles are posted below in chronological order. Also browse by [tag](/tags) or [category](/categories).
|
Articles are posted chronologically below. You may also browse by [category](/categories) or [tag](/tags).
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ title: Voluntary Sovereignty
|
|||||||
date: "2025-09-28"
|
date: "2025-09-28"
|
||||||
author: Hyperling
|
author: Hyperling
|
||||||
tags:
|
tags:
|
||||||
- book
|
- ebook
|
||||||
- 'natural law'
|
- 'natural law'
|
||||||
- morality
|
- morality
|
||||||
- ethics
|
- ethics
|
||||||
@@ -21,7 +21,7 @@ tags:
|
|||||||
series:
|
series:
|
||||||
- freedom
|
- freedom
|
||||||
categories:
|
categories:
|
||||||
- eBook
|
- books
|
||||||
---
|
---
|
||||||
|
|
||||||
Short eBook and printable booklet succintly covering Morality and Sovereignty.
|
Short eBook and printable booklet succintly covering Morality and Sovereignty.
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
---
|
---
|
||||||
title: "My Health Protocol"
|
title: "Hyperling's Health Protocol"
|
||||||
date: "2024-03-07T12:00:00-07:00"
|
date: "2024-03-07T12:00:00-07:00"
|
||||||
author: "HyperVegan"
|
author: "HyperVegan"
|
||||||
tags:
|
tags:
|
||||||
- book
|
- ebook
|
||||||
- diet
|
- diet
|
||||||
- hydration
|
- hydration
|
||||||
- exercise
|
- exercise
|
||||||
@@ -17,7 +17,7 @@ tags:
|
|||||||
series:
|
series:
|
||||||
- health
|
- health
|
||||||
categories:
|
categories:
|
||||||
- eBook
|
- books
|
||||||
---
|
---
|
||||||
|
|
||||||
I define health as a 6-pillar system based on body dynamics, environment, and mentality. "Hyperling's Health Protocol" is my explanation of how to keep each pillar in peak condition by living as naturally as possible in an industrial world.
|
I define health as a 6-pillar system based on body dynamics, environment, and mentality. "Hyperling's Health Protocol" is my explanation of how to keep each pillar in peak condition by living as naturally as possible in an industrial world.
|
||||||
|
|||||||
@@ -3,15 +3,15 @@ title: "Wooden Camping Chair"
|
|||||||
author: 'Chad Michael "Bug" Greenwood'
|
author: 'Chad Michael "Bug" Greenwood'
|
||||||
date: "2025-09-15"
|
date: "2025-09-15"
|
||||||
tags:
|
tags:
|
||||||
- "crafts"
|
- "craft"
|
||||||
- "wood"
|
- "wood"
|
||||||
- "woodworking"
|
- "woodworking"
|
||||||
- "outdoors"
|
- "outdoors"
|
||||||
- "camping"
|
- "camping"
|
||||||
categories:
|
|
||||||
- "recipes"
|
|
||||||
series:
|
series:
|
||||||
- "chairs"
|
- "chairs"
|
||||||
|
categories:
|
||||||
|
- "recipes"
|
||||||
toc: true
|
toc: true
|
||||||
aliases:
|
aliases:
|
||||||
- /posts/wooden-camping-chair
|
- /posts/wooden-camping-chair
|
||||||
|
|||||||
@@ -1,16 +1,16 @@
|
|||||||
---
|
---
|
||||||
title: "SSH Key Access"
|
title: "SSH Key Access"
|
||||||
author: "Hyperling"
|
author: "Hyperling"
|
||||||
date: "2025-11-12T20:00:00-07:00"
|
date: "2025-11-13T20:00:00-07:00"
|
||||||
tags:
|
tags:
|
||||||
- tech
|
- tech
|
||||||
- networking
|
- networking
|
||||||
- linux
|
- linux
|
||||||
- ssh
|
- ssh
|
||||||
categories:
|
|
||||||
- guides
|
|
||||||
series:
|
series:
|
||||||
- sysadmin
|
- sysadmin
|
||||||
|
categories:
|
||||||
|
- guides
|
||||||
---
|
---
|
||||||
|
|
||||||
How to set up an SSH key and use it to access a remote machine.
|
How to set up an SSH key and use it to access a remote machine.
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Preventing Hacks"
|
title: "Preventing Hacks"
|
||||||
author: "Hyperling"
|
author: "Hyperling"
|
||||||
date: "2025-11-13T20:00:00-07:00"
|
date: "2025-11-13T21:00:00-07:00"
|
||||||
tags:
|
tags:
|
||||||
- tech
|
- tech
|
||||||
- hacking
|
- hacking
|
||||||
@@ -11,17 +11,18 @@ tags:
|
|||||||
- lynis
|
- lynis
|
||||||
- nmap
|
- nmap
|
||||||
- metasploit
|
- metasploit
|
||||||
categories:
|
|
||||||
- guides
|
|
||||||
series:
|
series:
|
||||||
- sysadmin
|
- sysadmin
|
||||||
# TBD/TODO: Is the theme oreventing this from working properly?
|
categories:
|
||||||
|
- guides
|
||||||
toc: true
|
toc: true
|
||||||
#toc_start_level: 3
|
#toc_start_level: 2
|
||||||
#toc_end_level: 5
|
#toc_end_level: 5
|
||||||
---
|
---
|
||||||
|
|
||||||
How to check for system vulnerabilities.
|
## Tips on System Penetration Testing
|
||||||
|
|
||||||
|
How to check for system vulnerabilities through self-audits.
|
||||||
|
|
||||||
*A few of these tools can be used offensively. It is bad etiquette to use them on systems which you do not own. Please respect others and do not attempt to cause harm.*
|
*A few of these tools can be used offensively. It is bad etiquette to use them on systems which you do not own. Please respect others and do not attempt to cause harm.*
|
||||||
|
|
||||||
@@ -118,7 +119,7 @@ Most vulnerabilities are fixed by upgrading software, migrating to safer softwar
|
|||||||
|
|
||||||
### Metasploit
|
### Metasploit
|
||||||
|
|
||||||
***This tool IS aggressive and should NEVER be used against any systems you do not own or have explicit permission to test against.*** Thank you.
|
***This tool IS aggressive and should NEVER be used against any systems you do not own or have explicit permission to test against.*** **Thank you.**
|
||||||
|
|
||||||
I recommend playing with Metasploit if you have extra time so that you can learn how easy it is to penetrate an exploit once it is found with NMap.
|
I recommend playing with Metasploit if you have extra time so that you can learn how easy it is to penetrate an exploit once it is found with NMap.
|
||||||
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ tags:
|
|||||||
series:
|
series:
|
||||||
- poetry
|
- poetry
|
||||||
categories:
|
categories:
|
||||||
- musing
|
- musings
|
||||||
---
|
---
|
||||||
|
|
||||||
> Friend, friend, what is a friend? <br>
|
> Friend, friend, what is a friend? <br>
|
||||||
|
|||||||
@@ -1,12 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: "Simply Seasoned Dahl w/ Zucchini"
|
title: "Simple Dahl w/ Zucchini"
|
||||||
author: 'Chad Michael "Bug" Greenwood'
|
author: 'Chad Michael "Bug" Greenwood'
|
||||||
|
date: "2025-09-01"
|
||||||
tags: [food, pressure cooker, rice, lentils, dahl, vegetables, curry]
|
tags: [food, pressure cooker, rice, lentils, dahl, vegetables, curry]
|
||||||
series:
|
series:
|
||||||
- "curries"
|
- "curries"
|
||||||
categories:
|
categories:
|
||||||
- "recipes"
|
- "recipes"
|
||||||
date: "2025-09-01"
|
|
||||||
aliases:
|
aliases:
|
||||||
- /posts/dahl-zucchini-seasoned
|
- /posts/dahl-zucchini-seasoned
|
||||||
- /posts/recipes/dahl-zucchini-seasoned
|
- /posts/recipes/dahl-zucchini-seasoned
|
||||||
|
|||||||
Reference in New Issue
Block a user