Wake-on-LAN (WoL) is a feature that lets you turn on computers remotely. This can be […]
The post Wake on LAN: Linux, Windows and Routers first appeared on Brezular's Blog.
The Dell OptiPlex 7050 SFF is a capable machine for virtualization thanks to its Intel […]
The post Dell Optiplex 7050 SFF Upgrade for Proxmox first appeared on Brezular's Blog.
This lab delves into configuring a Cisco 1812 router, a legacy device with 100 Mbps […]
The post Cisco 1812 as Home Router first appeared on Brezular's Blog.
This guide demonstrates how to install Debian 12 (bookworm), also known as "bookworm," on a […]
The post Debian Installation on Raspberry Pi first appeared on Brezular's Blog.
In this article, we explore the capabilities and limitations of the Luma AI Dream Machine. […]
The post Testing Luma AI Dream Machine first appeared on Brezular's Blog.
This guide helps you to install Pi-hole on your Raspberry Pi 3B running Debian 12, […]
The post Pi-hole on Raspberry Pi 3B with Debian first appeared on Brezular's Blog.
Pi-hole, the network-wide ad-blocking solution, has recently undergone significant updates, introducing a range of new […]
The post Testing Pi-hole Development Version 6 first appeared on Brezular's Blog.
USB drives typically have a longer lifespan and better durability compared to SD cards, especially […]
The post Booting Raspberry Pi 3 B from USB Drive first appeared on Brezular's Blog.
In ARP Spoofing Attack article, we provided a Python script that an attacker can use […]
The post Dynamic ARP Inspection in DHCP Environment first appeared on Brezular's Blog.
In the "MAC Flooding Attack" tutorial, we explained how to easily saturate the MAC address […]
The post Protecting Against MAC Flooding Attack first appeared on Brezular's Blog.
A port on a Cisco switch is either an access port or a trunk port. […]
The post Cisco Dynamic Trunk Protocol Hacking with Scapy first appeared on Brezular's Blog.
Hash cracking is often paused or stopped for various reasons. Hashcat has a Pause button […]
The post Restoring Hashcat Cracking first appeared on Brezular's Blog.
In the previous tutorial "Cracking WPA/WPA2 Pre-shared Key Using GPU", we showed how to crack […]
The post WPA2 Cracking On NVIDIA with CUDA first appeared on Brezular's Blog.
In this tutorial, I will show you how to use DreamBooth to finetune pre-trained open-source […]
The post Dreambooth in Stable Diffusion Web UI first appeared on Brezular's Blog.
In this tutorial, I will share my experience installing the web-based user interface for Stable […]
The post Stable Diffusion Web UI on Linux first appeared on Brezular's Blog.
Large language models (LLM) can be run on CPU. However, the performance of the model […]
The post Running Large Language Models on CPU first appeared on Brezular's Blog.
This tutorial will guide you through the process of running LLaMA and Alpaca models on […]
The post Running Alpaca AI on Low Cost PC with DALAI first appeared on Brezular's Blog.
Stable Diffusion is a text-to-image latent diffusion model created by the researchers and engineers from […]
The post Stable Diffusion Installation on Linux first appeared on Brezular's Blog.
Unlike a hub, a switch is a network device that typically does not forward a […]
The post MAC Flooding Attack first appeared on Brezular's Blog.
In a previous tutorial, we discussed the configuration of an OpenVPN Server on a Mikrotik […]
The post OpenVPN Windows Client with MikroTik first appeared on Brezular's Blog.