Jacen's Blog

Blog

TryHackMe - The Marketplace

August 17, 2025

The Marketplace is a medium-ranked box on TryHackMe. It contains a variety of interesting steps along the killchain. While it isn't super difficult, it does take some critical thinking and good enumeration to get through.

Read more...
Blog

Staying Entertained - The TTY-Only Challenge Part 2

August 15, 2025

In the first post in this series, we set up a TTY-only laptop running Arch Linux with the intent of daily driving it. We got a lot of the productivity essentials done, but we didn't do much in the way of entertainment. Let's start looking into how we can make things less boring and have fun in our command-line environment.

Read more...
Blog

TryHackMe - Git Happens

August 5, 2025

Git Happens is an easy-ranked box on TryHackMe. It's extremely short and simple, but it serves as a good reminder of the dangers of using Git if you don't really know what you're doing.

Read more...
Blog

Can You Use Linux Without Leaving The Command Line? - The TTY-Only Challenge

August 2, 2025

One of the most parroted advantages of Linux is its customizability. With plenty of distributions, desktop environments, window managers, and many combinations thereof, there are so many ways to tune your graphical environment exactly the way you want it.

So, what if we take all of that away and strip Linux down to its core? Can we use Linux from just the command line the way people did back in the early days of computing? There's only one way to find out, and that's to try it for ourselves.

Read more...
Blog

The Whole-Home AdGuard Proxy

July 14, 2025

I've talked about adblockers in the past, particularly my dislike of Pi-hole and preference toward AdGuard. However, AdGuard comes with a number of hangups, namely that you need a license for every device in your home that you want to protect. But what if you could protect your entire home from a single server? Is it doable?

Read more...
Blog

IT Pro Tip - Don't Deny Permissions

July 12, 2025

You're setting up a new shared folder on a Windows file server, probably one that holds sensitive information. You want to be sure that no one unauthorized can access the files, so in the Security tab, you set a new permission entry to deny access to the "Everyone" object.

You've just fallen for one of the oldest pitfalls in the book. Let's go over Windows file permissions and why the "deny" permission is one of the most dangerous.

Read more...
Blog

IT Pro Tip - Recovering Local Admin Access

June 21, 2025

Even in a domain environment, once in a while things go wrong and you need a local administrator account. Maybe you're taking over for an unhelpful rival IT department, or maybe you've had an employee who didn't document things correctly. Regardless of the reason, sometimes you just don't have access to everything you need to do your job.

Read more...
Blog

The GL.iNet Comet - A Review

May 3, 2025

A while back, I purchased GL.iNet's AC1300 router for a project that never ended up materializing. Despite that, it is still a staple in my backpack, and it put GL.iNet on my radar. So, when I received an email about the GL-RM1 Comet remote KVM, my interest was definitely piqued.

Read more...
Blog

Reviewing the Gamer Supps Experience

May 2, 2025

A Twitch streamer I watch got an affiliate code with Gamer Supps recently and has begun shilling it pretty hard. I like trying new foods and drinks, and I'll try almost anything at least once. Because they have a free sample option, I decided to use his code to get a couple of free packs to see just what it tasted like.

Read more...
Blog

IT Pro Tip - Viewing Outlook Rules Using Powershell

April 23, 2025

With people continuing to insist on using poor and easily guessable passwords, hacked emails are something I deal with occasionally.

Of all cybersecurity incidents, hacked emails are some of the easiest to remediate. Once you've kicked the attacker out by forcing a global sign-out and resetting their password, then informed any affected recipients about the hack, you're done, right?

Wrong. There's a step I've seen even experienced IT techs forget about. Inevitably, you'll receive another call from the user informing you that they aren't receiving emails anymore. Let's take a look at how to troubleshoot that.

Read more...

View on GitHub

Privacy Policy

Neocities Logo