How to Automate “Quiet Quitting”: Create a Fake Progress Bar with PythonI’ve heard people actually pay money for this, but use at your own risk! Using this script at your place of work could get you fired. This…Sep 11Sep 11
Name That OSI Model Layer: An Exercise in CybersecurityDo you want to be a cybersecurity professional? Learn this vocab and connect it to the OSI ModelApr 7, 2023Apr 7, 2023
Name That OSI Model Layer: Know Your Layers and Cybersecurity VocabRelating all things to the OSI Model Layers is a handy exercise, not a ‘handsy exercise’ as the photo would suggest.Apr 5, 2023Apr 5, 2023
IT Security Assessments: A Proactive Approach to CybersecurityAssess your network to ensure you have the best security. This Is The Way.Apr 4, 2023Apr 4, 2023
Hey man! What’s a WAN?Some IT networking fundamentals you should know for cybersecurity! A quick article for your learning pleasure.Apr 3, 2023Apr 3, 2023
Using an Attacker’s Tools to Stop Network Attacks“Our enemies are our greatest teachers” — Dalai LamaMar 28, 2023Mar 28, 2023
For the Budding Cybersecurity Student: An Exercise You Must Endure!A list of IT vocab and how it relates to the OSI Model. Basically, everything in IT and cybersecurity hinges on the OSI Model. So relating…Mar 27, 2023Mar 27, 2023
Securing Physical Access to the NetworkThis is about literally having physical barriers to protect your network from being physically touched by bad people. Network security must…Mar 27, 2023Mar 27, 2023