close

DEV Community

Paula profile picture

Paula

29 years old. Cyber. I really like bash and simple scripts. Solarpunk and free software advocate!

Location Many places Joined Joined on  github website twitter website

Education

Computer science, fine arts

Pronouns

she/her

Work

Cybersecurity

Nine Year Club
Eight Year Club
Seven Year Club
Writing Debut
2 Week Community Wellness Streak
1 Week Community Wellness Streak
Six Year Club
Trusted Member 2022
Five Year Club
Four Year Club
Top 7
Three Year Club
Bye bye!

Bye bye!

BERJAYA BERJAYA BERJAYA 13
Comments 2
4 min read

Want to connect with Paula?

Create an account to connect with Paula. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Preparing for esLibre

Preparing for esLibre

BERJAYA 3
Comments
3 min read
Linux Exfiltration

Linux Exfiltration

BERJAYA BERJAYA BERJAYA 9
Comments 2
3 min read
Creating a Linux Terminal Pokedex

Creating a Linux Terminal Pokedex

BERJAYA BERJAYA BERJAYA 16
Comments 1
4 min read
Analyzing a Linux malware binary

Analyzing a Linux malware binary

BERJAYA BERJAYA BERJAYA 27
Comments 5
4 min read
The broken spaceship Honeypot updates

The broken spaceship Honeypot updates

BERJAYA 3
Comments
1 min read
CALL me, maybe

CALL me, maybe

BERJAYA BERJAYA 11
Comments 6
10 min read
Linux security LAB Broken Spaceship

Linux security LAB Broken Spaceship

BERJAYA BERJAYA BERJAYA 6
Comments 2
1 min read
Creating a simple wind forecast bot in Mastodon

Creating a simple wind forecast bot in Mastodon

BERJAYA BERJAYA BERJAYA 12
Comments 2
3 min read
Tech Comfort

Tech Comfort

BERJAYA 2
Comments
7 min read
TinEAR, using GA for music inspiration

TinEAR, using GA for music inspiration

BERJAYA BERJAYA BERJAYA 6
Comments 4
2 min read
Hello back! Sharing some projects

Hello back! Sharing some projects

BERJAYA BERJAYA 3
Comments 2
1 min read
Music making with neo trellis

Music making with neo trellis

BERJAYA 5
Comments
3 min read
Livecoding with Orca and minimalist tech

Livecoding with Orca and minimalist tech

BERJAYA BERJAYA 7
Comments
4 min read
Using Empire4 without Kali

Using Empire4 without Kali

BERJAYA BERJAYA 12
Comments 1
4 min read
Pentesting detection on EDR

Pentesting detection on EDR

BERJAYA BERJAYA 19
Comments
2 min read
Code of Conduct adventures

Code of Conduct adventures

BERJAYA BERJAYA 15
Comments 2
4 min read
Raku malware analysis

Raku malware analysis

BERJAYA BERJAYA 19
Comments
3 min read
Yara for daily analysis

Yara for daily analysis

BERJAYA 10
Comments 2
2 min read
Closer than it seems, Part 1

Closer than it seems, Part 1

BERJAYA BERJAYA 17
Comments 1
5 min read
Wireless bike signalling

Wireless bike signalling

BERJAYA BERJAYA 15
Comments 3
3 min read
Wio terminal plant translator and other projects

Wio terminal plant translator and other projects

BERJAYA BERJAYA 15
Comments
4 min read
Freedom of Security with Paula de la Hoz 13:25

Freedom of Security with Paula de la Hoz

BERJAYA BERJAYA 61
Comments 30
1 min read
Safety on the streets with python

Safety on the streets with python

BERJAYA BERJAYA 26
Comments
2 min read
Social Engineering: The performance security

Social Engineering: The performance security

BERJAYA BERJAYA 20
Comments
5 min read
Why anti-encryption laws are crazy

Why anti-encryption laws are crazy

BERJAYA BERJAYA 68
Comments 8
4 min read
Happy in tech, regardless my sexuality

Happy in tech, regardless my sexuality

BERJAYA BERJAYA 54
Comments 2
1 min read
Open Michi 1 - rewarding a robot cat

Open Michi 1 - rewarding a robot cat

BERJAYA BERJAYA 6
Comments
5 min read
Genetic algorithms for brute forcing

Genetic algorithms for brute forcing

BERJAYA BERJAYA 90
Comments 9
1 min read
ハードウェアのハッキング

ハードウェアのハッキング

BERJAYA 6
Comments
1 min read
Enhancing my tattoo machine

Enhancing my tattoo machine

BERJAYA BERJAYA 43
Comments 13
4 min read
The beauty of consoles

The beauty of consoles

BERJAYA BERJAYA 36
Comments 3
7 min read
Your friend and neighbour WiFi

Your friend and neighbour WiFi

BERJAYA BERJAYA 58
Comments 18
2 min read
Introduction to industrial security

Introduction to industrial security

BERJAYA BERJAYA 38
Comments
3 min read
Programming thinking and society

Programming thinking and society

BERJAYA 18
Comments 4
6 min read
Attacks in times of fear

Attacks in times of fear

BERJAYA BERJAYA 38
Comments
2 min read
I know what you did.

I know what you did.

BERJAYA BERJAYA 23
Comments 1
2 min read
Let's talk about Linux

Let's talk about Linux

BERJAYA BERJAYA 118
Comments 68
1 min read
Nevertheless, Paula Coded

Nevertheless, Paula Coded

BERJAYA BERJAYA 19
Comments
2 min read
Hello administrator, I can see you

Hello administrator, I can see you

BERJAYA BERJAYA 20
Comments
3 min read
Hide your face

Hide your face

BERJAYA BERJAYA 60
Comments 7
3 min read
Hack the wires

Hack the wires

BERJAYA BERJAYA 27
Comments
3 min read
Open tools for teaching

Open tools for teaching

BERJAYA BERJAYA 42
Comments 2
2 min read
Welcome at work Kyle!

Welcome at work Kyle!

BERJAYA BERJAYA 18
Comments 6
4 min read
Post-apocalypse gear

Post-apocalypse gear

BERJAYA 14
Comments 2
5 min read
TELLIT

TELLIT

BERJAYA BERJAYA 9
Comments
1 min read
5 must-do security tips for developers

5 must-do security tips for developers

BERJAYA BERJAYA 105
Comments 8
3 min read
On freedom and privacy

On freedom and privacy

BERJAYA BERJAYA 36
Comments 6
2 min read
Introduction to computer forensics

Introduction to computer forensics

BERJAYA BERJAYA 123
Comments 11
5 min read
Introduction to Linux Hardening

Introduction to Linux Hardening

BERJAYA BERJAYA 192
Comments 10
3 min read
Nevertheless, Paula Coded

Nevertheless, Paula Coded

BERJAYA BERJAYA 47
Comments 3
2 min read
FOSDEM experience

FOSDEM experience

BERJAYA 15
Comments 2
2 min read
About SSL/TLS security

About SSL/TLS security

BERJAYA BERJAYA 76
Comments 1
3 min read
Robótica educativa

Robótica educativa

BERJAYA BERJAYA 20
Comments 6
8 min read
I'm a security auditor and researcher, Ask Me Anything!

I'm a security auditor and researcher, Ask Me Anything!

BERJAYA BERJAYA 38
Comments 32
2 min read
Security Sprint: using Seccomp for secure containers.

Security Sprint: using Seccomp for secure containers.

BERJAYA BERJAYA 20
Comments
3 min read
The point of freedom

The point of freedom

BERJAYA BERJAYA 22
Comments 10
4 min read
Security Sprint: The new Internet

Security Sprint: The new Internet

BERJAYA BERJAYA 54
Comments 6
2 min read
The container is in danger!

The container is in danger!

BERJAYA BERJAYA 21
Comments 10
2 min read
Security Sprint: Falco

Security Sprint: Falco

BERJAYA BERJAYA 38
Comments
3 min read
loading...