Sitemap
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Pages
Posts
Stroomuitval: Wat te doen voor, tijdens en na
Published:
Hoe bereid ik mijn huis voor op een stroomuitval? (van meer dan 24 uur)
Aardbeving: Wat te doen voor, tijdens en na
Published:
Een aardbeving, wat doe je? En hoe kun je je voorbereiden?
HTB Editorial Writeup
Published:
A writeup of the Hack The Box machine “Editorial” with easy difficulty
HTB Crafty Writeup
Published:
A writeup of the Hack The Box machine “Crafty” with easy difficulty
HTB Mailing Writeup
Published:
A writeup of the Hack The Box machine “Mailing” with easy difficulty
HTB Bizness Writeup
Published:
A writeup of the Hack The Box machine “Bizness” with easy difficulty
HTB Usage Writeup
Published:
A writeup of the Hack The Box machine “Usage” with easy difficulty
portfolio
Mobile social media app
I made a simple hybrid mobile social media app with Adalo
publications
Securing Democracy: The Role of Ethical Hacking in Election Security
Published in Personal website, 2023
This research delves into the critical topic of election security, focusing on the role of ethical hacking in safeguarding digital elections.
Recommended citation: Ruijgrok, Tiemen. (2023). "Securing Democracy: The Role of Ethical Hacking in Election Security." Personal website. 1(1). http://tiemenruijgrok.github.io/files/Paper-CEH_TiemenRuijgrok.pdf
Cyber Training in Maritime Cybersecurity
Published in Personal website, 2024
This paper is about how organizations must proactively address cybersecurity awareness to stay ahead of potential threats.
Recommended citation: Ruijgrok, Tiemen. (2024). "Cyber Training in Maritime Cybersecurity." Personal website. 1(2). http://tiemenruijgrok.github.io/files/[email protected]
talks
Here
Published:
teaching
Complete Guide to Setting Up iSCSI Shared Storage with Ubuntu Server and Windows Client
, 3, december, 2024
This guide walks you through setting up an iSCSI target on an Ubuntu server and connecting a Windows machine as an iSCSI client. The process includes configuring the iSCSI service, preparing the disk, and connecting it to Windows. This setup is optimized for single-client use to avoid data corruption.