A port on a Cisco switch is either an access port or a trunk port. […]
Restoring Hashcat Cracking
Hash cracking is often paused or stopped for various reasons. Hashcat has a Pause button […]
WPA2 Cracking On NVIDIA with CUDA
In the previous tutorial “Cracking WPA/WPA2 Pre-shared Key Using GPU”, we showed how to crack […]
Dreambooth in Stable Diffusion Web UI
In this tutorial, I will show you how to use DreamBooth to finetune pre-trained open-source […]
Stable Diffusion Web UI on Linux
In this tutorial, I will share my experience installing the web-based user interface for Stable […]
Running Large Language Models on CPU
Large language models (LLM) can be run on CPU. However, the performance of the model […]
Running Alpaca AI on Low Cost PC with DALAI
This tutorial will guide you through the process of running LLaMA and Alpaca models on […]
Stable Diffusion Installation on Linux
Stable Diffusion is a text-to-image latent diffusion model created by the researchers and engineers from […]
MAC Flooding Attack
Unlike a hub, a switch is a network device that typically does not forward a […]
OpenVPN Windows Client with MikroTik
In a previous tutorial, we discussed the configuration of an OpenVPN Server on a Mikrotik […]