For some more guides/walkthroughs, check out the Basic guides.

Currently this section is organized by author.

Things to keep in mind

First, before blindly diving into the technical knowledge, there's a few basics designed to save overall time by preparing the reader for the best experience possible.

Please see and heed the early warning section, including the referenced technology warning.
Additional content
Also, another tip to keep in mind: While reading the site's core content, remember that there are additional resources that help explain things, such as interpreting the customizable “styles” (which cause the various colors that are splashed around the website).
[#tutgobak]: Time-saving navigational advice

When reading the tutorials, time will likely be saved by staying on track to complete the tutorial, namely by being careful to avoid reading too much from the vast amounts of information beyond what is included and in, directly referenced by, the tutorials. This is probably much more difficult than it originally sounds, because there is so much information both on this website and on other websites that these tutorials refer to. The ][Cyber Pillar][ website may help by using user-selectable stylesheets. The following example section of the ][Cyber Pillar][ website may demonstrate such a visible style.

Example subsection
Example text. Below this text there may be a border style on the bottom which indicates that it is time to press the back button on the web browser.

A visual clue, such as a clearly visible bottom border, may be a clear reminder to make a determination. Consider if a task has been completed. More specifically, consider if it is now time to return to some previous hypertext which had referred to the text just read.

This technique may work primarily on web pages that are on ][Cyber Pillar][. Note that referenced websites are generally not required to complete any tutorial, unless it is clearly (probably explicitly) stated that visiting such an external website is needed (perhaps, for example, to download files). Visiting other websites may lead to some other interesting text, but reading too much can turn a multi-hour task into a multi-week or multi-year project. (Although it may be very educational, initial learning may come more quickly by setting up some infrastructure and gaining experience with it over time as other material is also read.)

At the time of this writing, the visual clue of a section being highlighted only seems to work when visiting a new page. If there is a hyperlink to another section of the same web page, the highlighting is not taking effect. (At the time of this writing, this has not been heavily looked into, in order to be fixed.)

The Tutorials

TOOGAM's Tutorials

The following tutorials are either available now or predicted to become available soon.

Some of the hyperlinked tutorials may not really be ready yet...

[#gettrust]: Get trusted

Is equipment being used, even though there is a high possibility that the computer's software has compromised security? A simple malware scan may be likley to catch most, but not all, cases of problems. It also may not catch certain types of back doors, such as extra and unneeded accounts or permissions provided to certain accounts. Certain types of scans and audits may also help with that, but what about software exploits?

Creating a new and trusted installation can be a far quicker approach, and be more effective, than running numerous scans and audits hoping to catch something. The key, though, is to keep the trust, once it is established, so that any benefits are not ruined.

Also, keeping data separate from implementations can have advantages: easier upgrades to new technologies, the ability to focus a backup strategy on the less easily replaced data, and reduced dependancy on implementations that may provide lock-in. Metaphorically keeping babies separate from bathwater can provide flexibility.

File systems (partitioning a hard drive)

Many computers have been set up partitioning schemes that cause limitations which are extremely unnecessary. Worse, in some rare cases data loss has been known to occur because of file system boundaries. Taking a bit of time to plan this will can increase flexibility by leaving options open.

Although partitioning can be done within the installation procedure of most operating systems, sometimes the interface used during such an installation may not be as preferable as another method to create the partitions. The computer being partitioned may not be easily able to look up (online) documentation. The most sensible time to determine multiple mount points may be the time before partitioning takes effect.

This upcoming/future tutorial may provide some design recommendations. (These “recommendations” may include a number of opinions.) Other data (in the form of more-established facts) may currently be found in the MBR partition information in the Techn's area, or will be in a nearby URL/location. Other information related to the topic of how data is laid out on disks is also currently available.

Installing an OS

Many operating systems work best by installing them to a fixed disk (such as a magnetic hard drive or a solid-state disk) which is fast, re-writable, and typically available.

Network address planning
At least for now, such information may be part of information available on pages such as: a tutorial for setting up an operating system, a tutorial for creating multiple virtual machines, and networking address planning.
Setup Tasks for the installed operating system

After the operating system's installation, which may be basically defined as the point when an operating system can be started when the computer reboots and without using temporary media, there are certain tasks which are often performed early on. For security's sake, some steps should be performed early on (regardless of whether or not they are typically done.) For a “multi-boot” system, a very early step may be to make sure that other operating systems are also able to be started as desired.

TOOGAM's tutorial for making (and setting up) a virtual machine
There are huge advantages to virtualization. This tutorial is basically about how to make multiple virtual machines.
TOOGAM's tutorial for multiple virtual machines

Creating one virtual machine may be nice. Having multiple virtual machines may also be nice, especially if they are successfully able to effectively work with each other.

Building a network

A tutorial on building a network

Cleaning up a compromised system

Cleaning up a compromised system may be able to quickly recover from malware (e.g. viruses).

Using IPv6

Using IPv6

Data compression
Learn how to create small archives. See: bit compression.
Running a BBS
Running a “bulliten board system”. This software permitted features like allowing people to send and receive E-Mail messages, participate in “bulliten boards” (similar to web-based forums that have since become more popular), share files, and play online games by computers with a “dial-up modem”, and were quite interesting to people who had computers and modems, but whom did not have Internet access. Such a scenario was more common in the early 1990s before Internet access became more widespread. These systems became less popular as Internet access grew more popular. However, the software can still work.
Microsoft Windows: Customizing
Microsoft Windows: Customizing.
Getting Software to Install

This page compares some processes of obtaining freely available software.

Coming up

Coming up: It is expected that the next tutorials will be on:

Popular services
Setting up redundant servers to perform popular functions, including:

Update: Some progress has been made. Much of this is currently covered by: multi-server project.

Using the technology

Covers taking control of an unknown network. This is a task that an IT support organization may be assigned. A team of IT professionals may find this needed when they start supporting an additional company, or if a company being supported ends up acquiring another company. Tasks of supporting the new network may include identifying what services are provided by the equipment, ensuring the services are secured, and ensuring that data is being backed up successfully. These tasks can often be done with very little downtime, and so minimal downtime is requested. This is the sort of scenario that has been enacted time and time again by the Collegiate Cyber Defense Competitions.

Actually, a lot of this may be covered by earlier tutorials, including the tutorial on how to get trusted technology running a network.

Other recommended resources

Not all of the information that TOOGAM has written is in these tutorials. (TOOGAM basically created the original version of Cyber Pillar.)

Providing services
As an example of another topic of possible interest, some hints for getting paid for computer knowledge may be in the web page about providing services. Those who think they have enough computer know-how to get paid (which may include many of the people who have read Cyber Pillar's readable material), but who haven't yet obtained an income in a technology-based industry, may be able to pick up some pointers. Overviews of various careers, such as being a computer programmer and/or web designer and/or IT technician, may be beneficial for someone interested in another area of specialty.
Way more
See Cyber Pillar's main site. At the time of this writing, much of the material was generated by TOOGAM.
TOOGAM's software archive

Before taking the dive into the mission of conquering the learning curve needed to become comfortable with a Unix-ish environment, TOOGAM documented some download links for various software for DOS (MS-DOS and similar/compatible) operating systems, and similar/compatible platforms (Windows 98 Second Edition, OS/2, etc.) Although much of that software has lost general usefulness since the x64 CPU standard has ditched compatibility for 8-bit and 16-bit code, the results of this work continue to be available for anyone who can still benefit from having the information available. For further details, see TOOGAM's Software Archive.

Tutorials by others have not yet been posted in this section. For more details about submitting content, see information on the main page and/or in helping ][Cyber Pillar][.