Skip to content

Commit 7b77611

Browse files
committed
Fix markdown spacing in intro note batch
1 parent f06abf2 commit 7b77611

6 files changed

Lines changed: 192 additions & 96 deletions

File tree

TryHackMe/00-foundations/computer-types.md

Lines changed: 25 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,31 @@
11
---
2-
3-
platform: TryHackMe
2+
type: resource-note
3+
status: done
4+
created: 2026-02-15
5+
updated: 2026-03-12
6+
tags: [security-writeup, tryhackme, hardware, systems]
7+
source: TryHackMe - Computer Types
8+
platform: tryhackme
49
room: Computer Types
510
slug: computer-types
611
path: TryHackMe/00-foundations/computer-types.md
712
topic: 00-foundations
8-
domain: [Systems]
13+
domain: [foundations, hardware]
914
skills: [hardware-basics, infra-basics, systems-thinking]
1015
artifacts: [concept-notes]
11-
status: done
12-
date: 2026-02-15
16+
sanitized: true
1317
---
1418

15-
## 0) Summary
19+
# Computer Types
20+
21+
## Summary
1622

1723
* Computers are not defined by having a screen/keyboard; many are “hidden” inside everyday objects.
1824
* Different computer types exist because design is a trade-off: mobility vs cooling/performance; reliability vs cost; purpose shapes interface and architecture.
1925
* Key taxonomy covered: Laptop, Desktop, Workstation, Server, Smartphone, Tablet, IoT device, Embedded computer.
2026
* A practical rule: *There is no best computer; only the right tool for the job.*
2127

22-
## 1) Key Concepts
28+
## Key Concepts
2329

2430
### 1.1 Computers you sit in front of
2531

@@ -57,9 +63,9 @@ IoT vs Embedded (quick discriminator):
5763
* Reliability costs money: critical systems use redundancy (extra power supplies/disks) to reduce failure.
5864
* Purpose shapes everything: phones are interacted with directly; servers are queried for services; embedded systems operate quietly.
5965

60-
## 2) Walkthrough Notes by Task (based on provided screenshots)
66+
### 2) Walkthrough Notes by Task (based on provided screenshots)
6167

62-
### Task 1 — Sophia’s First Day (Hidden computers)
68+
#### Task 1 — Sophia’s First Day (Hidden computers)
6369

6470
Goal: find all hidden computers with limited mistakes.
6571
Found set (8/8):
@@ -75,7 +81,7 @@ Found set (8/8):
7581

7682
Takeaway: “computer” includes any device with compute + control logic, not just PCs.
7783

78-
### Task 2 — The Hot Laptop (Cooling constraints)
84+
#### Task 2 — The Hot Laptop (Cooling constraints)
7985

8086
Observation:
8187

@@ -85,46 +91,46 @@ Observation:
8591
* Laptop: **throttles under load**.
8692
* Desktop: **sustained performance**.
8793

88-
### Task 3 — The Server Room (Redundancy)
94+
#### Task 3 — The Server Room (Redundancy)
8995

9096
Scenario: servers run 24/7; test power configurations.
9197
Key message: “Redundant power reduces a single failure point.”
9298
Note: uptime improves when redundancy is combined with backups and monitoring.
9399

94-
### Task 4 — The Right Tool (Match job → computer type)
100+
#### Task 4 — The Right Tool (Match job → computer type)
95101

96102
Matched jobs (3/3):
97103

98104
* Edit 4K video all day → **Workstation**
99105
* Host a website 24/7 → **Server**
100106
* Ring when button pressed → **Embedded**
101107

102-
### Task 5 — Graduation Quiz (answers from screenshots)
108+
#### Task 5 — Graduation Quiz (answers from screenshots)
103109

104-
1. Why do laptops throttle more than desktops?
110+
### Why do laptops throttle more than desktops?
105111

106112
* **Less cooling space**
107113

108-
2. What does server redundancy prevent?
114+
### What does server redundancy prevent?
109115

110116
* **Single point of failure**
111117

112-
3. Why do smartphones last longer on battery than laptops?
118+
### Why do smartphones last longer on battery than laptops?
113119

114120
* **Optimized for efficiency**
115121

116-
4. Which feature is more common in workstations?
122+
### Which feature is more common in workstations?
117123

118124
* **ECC RAM and certified drivers**
119125

120-
## 3) Pattern Cards (generalizable)
126+
## Pattern Cards
121127

122128
* Trade-off lens (Design Trade-offs / 设计权衡): portability ↔ cooling ↔ sustained performance.
123129
* Reliability engineering (Reliability / 可靠性): redundancy reduces SPOF (Single Point of Failure / 单点故障).
124130
* Taxonomy heuristic: if a device is single-purpose *and* network-connected → likely IoT; if single-purpose but offline → likely embedded.
125131
* Selection rule: choose by workload + uptime requirement + interaction model, not by appearance.
126132

127-
## 5) Takeaways
133+
## Takeaways
128134

129135
* “Computer” is a role (compute/control) rather than a shape (screen/keyboard).
130136
* Sustained workloads expose thermal design limits; desktops win when time-under-load matters.

TryHackMe/00-foundations/history-of-malware.md

Lines changed: 25 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,24 @@
11
---
2-
2+
type: resource-note
3+
status: done
4+
created: 2026-02-13
5+
updated: 2026-03-12
6+
tags: [security-writeup, tryhackme, malware, history]
7+
source: TryHackMe - History of Malware
38
platform: tryhackme
49
room: History of Malware
510
slug: history-of-malware
6-
path: notes/00-foundations/history-of-malware.md
11+
path: TryHackMe/00-foundations/history-of-malware.md
712
topic: 00-foundations
8-
domain: [malware]
9-
skills: [networking-history, malware-history, fundamentals]
13+
domain: [foundations, malware]
14+
skills: []
1015
artifacts: [concept-notes]
11-
status: done
12-
date: 2026-02-13
16+
sanitized: true
1317
---
1418

15-
## 0) Summary
19+
# History of Malware
20+
21+
## Summary
1622

1723
* Malware history is tightly coupled with how computers started to **share resources over networks** (resource sharing) and later how microcomputers spread software via **removable media** (floppy disks).
1824
* Early “malware-like” programs often looked like **experiments** in mobility or replication (e.g., Creeper), but they revealed real operational risks: uncontrolled replication → **resource exhaustion** and denial of service.
@@ -30,7 +36,7 @@ date: 2026-02-13
3036
* boot sector virus (引导扇区病毒)
3137
* obfuscation/encryption for stealth (为隐蔽而做的混淆/加密)
3238

33-
## 1) Key Concepts
39+
## Key Concepts
3440

3541
### 1.1 Self-replicating programs
3642

@@ -46,9 +52,9 @@ A simple mental model:
4652
[Data/File] -> [Packets] -> (Network routes) -> [Packets] -> [Reassembled Data/File]
4753
```
4854

49-
## 2) Timeline Notes (Task-by-Task)
55+
### 2) Timeline Notes (Task-by-Task)
5056

51-
### 2.1 Creeper (1971)
57+
#### 2.1 Creeper (1971)
5258

5359
Context:
5460

@@ -73,14 +79,14 @@ Key Q/A anchors:
7379
* Re-designed by: **Ray Tomlinson**
7480
* Printed text: **“I’m the creeper, catch me if you can!”**
7581

76-
### 2.2 ARPANET basics
82+
#### 2.2 ARPANET basics
7783

7884
* “ARPANET” stands for **Advanced Research Projects Agency Network**.
7985
* Early ARPANET emphasized **remote login** and **file transfer**.
8086
* The Network Working Group created the **Network Control Program (NCP)**.
8187
* Data transfer model: **packet switching**.
8288

83-
### 2.3 Reaper
89+
#### 2.3 Reaper
8490

8591
Context:
8692

@@ -98,7 +104,7 @@ Key Q/A anchors:
98104
* Main project (Bob Thomas): develop a **resource-sharing capability** (RSEXEC).
99105
* API: **Application Programming Interface**.
100106

101-
### 2.4 Wabbit / Rabbit (1974)
107+
#### 2.4 Wabbit / Rabbit (1974)
102108

103109
Context:
104110

@@ -118,7 +124,7 @@ Key Q/A anchors:
118124
* Modern-day “fork bomb” also known as: **Denial-of-Service attack**
119125
* Name derived from: Elmer Fudd’s pronunciation of “Rabbit” (“Wabbit”).
120126

121-
### 2.5 ANIMAL + PERVADE (1975)
127+
#### 2.5 ANIMAL + PERVADE (1975)
122128

123129
Context:
124130

@@ -142,7 +148,7 @@ Key Q/A anchors:
142148
* Malware type: **Trojan**
143149
* Wooden horse built by: **Greeks**
144150

145-
### 2.6 Elk Cloner (1982)
151+
#### 2.6 Elk Cloner (1982)
146152

147153
Context:
148154

@@ -167,7 +173,7 @@ Key Q/A anchors:
167173
* More/less common today: **less common**
168174
* Development time: **2 weeks**
169175

170-
### 2.7 The Morris Internet Worm (1988)
176+
#### 2.7 The Morris Internet Worm (1988)
171177

172178
Context:
173179

@@ -196,7 +202,7 @@ Key Q/A anchors:
196202
* rsh meaning: **remote shell**
197203
* Fork bomb is a type of: **Denial-of-Service**
198204

199-
### 2.8 Cascade
205+
#### 2.8 Cascade
200206

201207
What made it notable:
202208

@@ -220,7 +226,7 @@ Key Q/A anchors:
220226
* OS: **DOS**
221227
* Added bytes (typical): **1704**
222228

223-
## 3) Pattern Cards (transferable mental models)
229+
## Pattern Cards
224230

225231
### Pattern 1: Uncontrolled replication → DoS
226232

@@ -248,7 +254,7 @@ Encryption/obfuscation can be used defensively (privacy) or offensively (avoid d
248254
* First anti-virus program in this narrative: Reaper
249255
* API stands for: Application Programming Interface
250256

251-
## 5) References (optional, for fact-checking)
257+
## References
252258

253259
* SANS ISC diary on early worms / Creeper discussion (secondary summary).
254260
* Cascade (computer virus) overview (encyclopedic summary).

TryHackMe/00-foundations/intro-cybersecurity/careers-in-cyber.md

Lines changed: 35 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,30 @@
1-
# Careers in Cyber – Role Overview Notes
1+
---
2+
type: resource-note
3+
status: done
4+
created: 2026-03-11
5+
updated: 2026-03-11
6+
tags: [security-writeup, tryhackme, careers, cyber]
7+
source: TryHackMe - Careers in Cyber
8+
platform: tryhackme
9+
room: Careers in Cyber
10+
slug: careers-in-cyber
11+
path: TryHackMe/00-foundations/intro-cybersecurity/careers-in-cyber.md
12+
topic: 00-foundations
13+
domain: [foundations]
14+
skills: []
15+
artifacts: [concept-notes]
16+
sanitized: true
17+
---
18+
19+
# Careers in Cyber
220

321
- **Type:** Concept / career mapping
422
- **Focus:** Security roles & typical responsibilities
523
- **Source context:** TryHackMe “Careers in Cyber” room
624

725
---
826

9-
## 1. Why Cyber Security as a Career?
27+
## Summary
1028

1129
Key points from the room:
1230

@@ -22,9 +40,11 @@ This note summarises the main roles presented in the room and how they connect.
2240

2341
---
2442

25-
## 2. Core Defensive & Monitoring Roles
43+
## Key Concepts
44+
45+
### 2. Core Defensive & Monitoring Roles
2646

27-
### 2.1 Security Analyst
47+
#### 2.1 Security Analyst
2848

2949
**Goal:** Maintain and continuously assess the security posture of an organisation.
3050

@@ -49,7 +69,7 @@ Role keywords:
4969

5070
---
5171

52-
### 2.2 Security Engineer
72+
#### 2.2 Security Engineer
5373

5474
**Goal:** Design, build, and maintain the technical defences.
5575

@@ -72,7 +92,7 @@ Role keywords:
7292

7393
---
7494

75-
### 2.3 Incident Responder
95+
#### 2.3 Incident Responder
7696

7797
**Goal:** Handle attacks while they are happening and minimise damage.
7898

@@ -98,9 +118,9 @@ Role keywords:
98118

99119
---
100120

101-
## 3. Investigation & Analysis Roles
121+
### 3. Investigation & Analysis Roles
102122

103-
### 3.1 Digital Forensics Examiner
123+
#### 3.1 Digital Forensics Examiner
104124

105125
**Goal:** Use digital evidence to understand what really happened.
106126

@@ -122,7 +142,7 @@ Role keywords:
122142

123143
---
124144

125-
### 3.2 Malware Analyst
145+
#### 3.2 Malware Analyst
126146

127147
**Goal:** Understand how malicious software works and how to detect/stop it.
128148

@@ -141,9 +161,9 @@ Role keywords:
141161

142162
---
143163

144-
## 4. Offensive & Adversarial Roles
164+
### 4. Offensive & Adversarial Roles
145165

146-
### 4.1 Penetration Tester
166+
#### 4.1 Penetration Tester
147167

148168
**Goal:** Legally attack systems to find vulnerabilities before criminals do.
149169

@@ -168,7 +188,7 @@ Role keywords:
168188

169189
---
170190

171-
### 4.2 Red Teamer
191+
#### 4.2 Red Teamer
172192

173193
**Goal:** Emulate real-world threat actors to test detection and response capabilities.
174194

@@ -197,7 +217,7 @@ Role keywords:
197217

198218
---
199219

200-
## 5. How These Roles Connect (Mental Map)
220+
### 5. How These Roles Connect (Mental Map)
201221

202222
You can think of an organisation’s security function as a loop:
203223

@@ -223,7 +243,7 @@ For a personal career path, common entry points are:
223243

224244
---
225245

226-
## 6. Personal Notes / Planning Hooks
246+
### 6. Personal Notes / Planning Hooks
227247

228248
Some questions to help align this with my own path:
229249

@@ -238,7 +258,7 @@ Some questions to help align this with my own path:
238258

239259
---
240260

241-
## 7. Glossary (EN–ZH)
261+
### 7. Glossary (EN–ZH)
242262

243263
- **Security Analyst** – 安全分析师
244264
- **Security Engineer** – 安全工程师

0 commit comments

Comments
 (0)