DEV Community

# apt

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
APTs: Defense Strategies and Mitigation Techniques

APTs: Defense Strategies and Mitigation Techniques

Comments
7 min read
APTs: Tactics, Techniques, and Procedures

APTs: Tactics, Techniques, and Procedures

Comments
7 min read
Debian 13 … is amazing! How to: Create your custom codehouse #1 [Demystifying Debian Linux Distro]

Debian 13 … is amazing! How to: Create your custom codehouse #1 [Demystifying Debian Linux Distro]

4
Comments
15 min read
How to pin a specific apt package version

How to pin a specific apt package version

Comments
2 min read
Anahtarı olmayan APT deposuna güvenilirliğin sağlanması

Anahtarı olmayan APT deposuna güvenilirliğin sağlanması

3
Comments
1 min read
apt-key'in deprecate olması

apt-key'in deprecate olması

4
Comments
1 min read
apt error: unable to use apt on ubuntu.

apt error: unable to use apt on ubuntu.

10
Comments 2
3 min read
Automate your Linux apt update and clean trash

Automate your Linux apt update and clean trash

1
Comments
3 min read
How to Setup Proxy on APT, Docker, and SSH

How to Setup Proxy on APT, Docker, and SSH

4
Comments 1
2 min read
Debian 12 … is amazing! How to: Create your custom codehouse #3 [Security mechanisms against malware]

Debian 12 … is amazing! How to: Create your custom codehouse #3 [Security mechanisms against malware]

1
Comments
23 min read
Why Advanced Persistent Threats important in Cyber Security?

Why Advanced Persistent Threats important in Cyber Security?

1
Comments
7 min read
Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies

1
Comments
2 min read
Understanding Advanced Persistent Threats (APTs)

Understanding Advanced Persistent Threats (APTs)

2
Comments
3 min read
Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.