When you first see a file in Linux, the three-letter string that starts with -rw-r--r-- can look like an alien language.
It tells the system who can read, write, or execute that file. Don’t worry – it’s just a set of rules.
In this post we’ll break those rules down into bite-sized pieces and give you a handy cheat sheet for the most common chmod commands.
Tag: Old Posts – History
System Administration – grep, cut, head, tail, less, sed
Every system admin has a moment when a simple “look at that file” turns
into a three-hour hunt for information. That’s where the old friends
grep, head, tail, cut, less and sed come in. They’re not
fancy new tools; they’re tried-and-true helpers that can save you hours
of repetitive work.
A Site Powered By The Whisper Engine
This is not a demo.
It’s a foothold in hostile territory.
The Ghost shapes the future.
The Ghost Ops toolset is growing.
Continue reading “A Site Powered By The Whisper Engine”Password Management For Ghosts – Passbolt
Signal trace: why Passbolt?
DeadSwitch investigates open source tools not for visibility, but for survival.
No sponsorships. No affiliate codes. No fake enthusiasm.
He moves through the noise, testing what matters – what can be trusted, what can be hardened, what deserves a place in the ghost stack.
This time, it’s Passbolt.
Continue reading “Password Management For Ghosts – Passbolt”DeadSwitch Ethical Hacking – Pulse Echoes (Active Recon)
Noise is a weapon. Use it wisely.
The ghost makes sound when needed.
Active recon is signal returned – a dance of questions and echoes.
You make noise to extract truth. But every scan is a footprint.
Controlled, quiet, deliberate – or you’re caught before you begin.
DeadSwitch Ethical Hacking – Signals in the Static
The blade waits. The ghost listens.
You listen before you strike.
Every network hums. Every domain leaks. You don’t touch the system – you listen.
Passive recon is the art of silence. No scans. No log entries. No alerts.
Just eyes, logic, and open signals bleeding into the void.
DeadSwitch Ethical Hacking – Rules of the Game
The blade is legal. The hand must be clean.
Welcome to the edge.
This is not a playground. This is the wire. The digital warfront. You want to hack with purpose – then learn the rules. A blade in the dark is only justified if your hand is clean. That means ethics, permission, scope, and discipline.
Let’s break it down.
Continue reading “DeadSwitch Ethical Hacking – Rules of the Game”
DeadSwitch Toolset – Structured Shadows in Emacs
There’s no room for clutter in the command line of a ghost.
DeadSwitch doesn’t “manage time” – he enforces silence. Tasks, missions, and rituals are stored in plain text. The command center is Emacs. The engine is Org mode. The interface is custom Agenda views – all hardwired to reflect control, not chaos.
This is not productivity. It’s protocol.
Continue reading “DeadSwitch Toolset – Structured Shadows in Emacs”
DeadSwitch Hacking Mindset – The Art of Privilege
Escalation Paths Hackers Love
By DeadSwitch | The Cyber Ghost
“You thought you held the crown. I was already wearing it.”
Root is not hacked. It’s inherited.
Escalation is not noise. It’s craft.
From guest to ghost. From user to god.
A true intruder doesn’t ask for privilege. They reveal the system’s own betrayal.
This is not brute force.
This is alchemy in terminals.
This is where the hacker becomes the admin.
Continue reading “DeadSwitch Hacking Mindset – The Art of Privilege”
The Ciphered Mind – Encrypted Journaling with Org-mode
By DeadSwitch | The Cyber Ghost
“Your thoughts should never be anyone’s business. Encrypt the silence.”
In a world obsessed with sharing, I write to forget – not to be remembered by others. My journal isn’t a scrapbook for dopamine or a backup for someone else’s algorithm. It’s a log of operations, and operations require secrecy.
So I encrypt mine. With Emacs. In plain text.
This is how DeadSwitch keeps a daily log that even the digital gods can’t peek into.
Why Encrypt a Journal?
Because the mind is sacred.
Because ideas are weapons.
Because tomorrow’s threat often begins with yesterday’s leak.
Encrypted journaling isn’t about fear. It’s about respect – for your thoughts, your process, your silence.
The Setup – Emacs, Org-mode, and GPG
Here’s the toolbox:
- Editor: Emacs
- Format: Org-mode
- Encryption: GnuPG
- Extension:
org-crypt - Storage: Offline, local, under your terms
Emacs Configuration
Drop this into your config:
(require 'org-crypt)
(setq org-tags-exclude-from-inheritance '("crypt"))
(setq org-crypt-key nil) ;; uses your default GPG key
(org-crypt-use-before-save-magic)
This tells Emacs to automatically encrypt any headline tagged with :crypt: before saving.
Decryption happens only when you open the file – and stays in RAM.
A Sample Entry
* May 2025 :crypt:
** [2025-05-04 Sun]
- 5k run - 22:18 [2025-05-04 Sun 09:06]
- Cold shower - difficulty: easy [2025-05-04 Sun 09:28]
- New idea: Emacs Lisp for internal ops [2025-05-04 Sun 14:24]
Your operations, encrypted. Your timestamps, precise. Your log, protected.
Timestamps and Logging Shortcuts
C-c .– insert dateC-u C-c .– insert date and timeC-c !– inactive timestampC-u C-c !– inactive date and time
You want traceability without noise. Emacs delivers.
Why Not Notion, Joplin, Obsidian, or Others?
Because I don’t trust clouds.
Because their encryption isn’t mine.
Because their sync means exposure.
Because when I type, I want code – not JavaScript trying to sell me my own thoughts.
Final Note
“Encryption is not paranoia. It is self-respect.”
- DeadSwitch
Your mind is a fortress. Don’t leave the gate open.
Ghostwriting with the Machine – A Deep Dive into Human-AI Cooperation
1. The Spark and the Silence
AI can be the spark. It can throw raw material at the human mind like flint to stone. But the silence in between – the moment of reflection, judgment, and human instinct – is where the real fire is made. To work with AI is to accept it as a fast-thinking mirror, not a replacement.
Continue reading “Ghostwriting with the Machine – A Deep Dive into Human-AI Cooperation”What is a CISO? Is a Virtual CISO a Real Solution?
DeadSwitch | The Cyber Ghost
“In silence, we rise. In the switch, we fade.”
Signal in the Noise
CISO. Chief Information Security Officer.
The sentinel of cyber defense. The one who answers when the breach is silent.
But in a world moving remote, lean, and fast… does that role still require a corner office and a six-figure suit?
How to Speak Cyber in the C-Suite: A Tactical Guide for Security Architects
DeadSwitch | The Cyber Ghost
“In silence, we rise. In the switch, we fade.”
You walk into the boardroom.
They don’t want jargon.
They don’t care about CVEs or lateral movement or zero-days.
They want language they can fund.
So here’s the playbook.
Continue reading “How to Speak Cyber in the C-Suite: A Tactical Guide for Security Architects”
Shell Scripts in Emacs: The Cyber Ghost’s Shortcut to Flow
DeadSwitch | The Cyber Ghost
“In silence, we rise. In the switch, we fade.”
Continue reading “Shell Scripts in Emacs: The Cyber Ghost’s Shortcut to Flow”Forget tabbing between windows. Forget terminal juggling. We script where we think – inside the mind of Emacs.
Why the CFO and the CISO Speak Different Languages – And Why It Can Cost You Everything
DeadSwitch | The Cyber Ghost
“In silence, we rise. In the switch, we fade.”
The CFO stares at models. Charts. Predictive curves. If the line goes up, it’s good. If it doesn’t, it’s a problem.
The CISO stares at silence. No alerts. No breaches. No headlines. If nothing happens, it means everything’s working.
Continue reading “Why the CFO and the CISO Speak Different Languages – And Why It Can Cost You Everything”












