PinnedCyber Grover 🐱💻Exploring Splunk for Investigative AnalysisComprehensive Splunk Series — Part 2Jan 5Jan 5
PinnedCyber Grover 🐱💻Mastering AD at Home: A Visual Guide to Setting Up Your LabIn today’s technology-driven world, understanding and mastering Active Directory (AD) is essential for anyone pursuing an IT, system…Dec 19, 2023Dec 19, 2023
Cyber Grover 🐱💻Mastering pfSense: An In-Depth Installation and Setup TutorialpfSense is a versatile and open-source firewall and routing platform that empowers users to take control of their network security and…Dec 26, 2023Dec 26, 2023
Cyber Grover 🐱💻Mastering NFS Shares: Setup, Root Squash, and Nmap Enumeration DemystifiedDec 11, 20231Dec 11, 20231
Cyber Grover 🐱💻Comprehensive Splunk Series: Part 1 — Installation and Configuration on Linux with Forwarder Agent…Welcome to the Comprehensive Splunk Series! In this multi-part guide, I will take you on a journey through the world of Splunk, a powerful…Dec 3, 2023Dec 3, 2023
Cyber Grover 🐱💻Setting Up an Ubuntu Server on Hyper-V: A Step-by-Step GuideHyper-V is a powerful virtualization platform offered by Microsoft, enabling users to create and manage virtual machines (VMs) on Windows…May 23, 20231May 23, 20231
Cyber Grover 🐱💻Regular Expressions — BasicsRegular expressions, also known as regex, are a sequence of characters that form a search pattern. Heavily used in programming and text…Feb 24, 2023Feb 24, 2023