The Linux Kernel Nexus: Where Power and Peril ConvergeWhen you start your cybersecurity journey, several concepts might seem fuzzy, like the Linux kernel. Please enjoy my attempt at…Jan 3Jan 3
DNS: The Internet’s Secret Address BookBoring sh*t you need to know for cybersecurityDec 18, 2024Dec 18, 2024
How to Automate “Quiet Quitting”: Create a Fake Progress Bar with PythonI’ve heard people actually pay money for this, but use at your own risk! Using this script at your place of work could get you fired. This…Sep 11, 2024Sep 11, 2024
Name That OSI Model Layer: An Exercise in CybersecurityDo you want to be a cybersecurity professional? Learn this vocab and connect it to the OSI ModelApr 7, 2023Apr 7, 2023
Name That OSI Model Layer: Know Your Layers and Cybersecurity VocabRelating all things to the OSI Model Layers is a handy exercise, not a ‘handsy exercise’ as the photo would suggest.Apr 5, 2023Apr 5, 2023
IT Security Assessments: A Proactive Approach to CybersecurityAssess your network to ensure you have the best security. This Is The Way.Apr 4, 2023Apr 4, 2023
Hey man! What’s a WAN?Some IT networking fundamentals you should know for cybersecurity! A quick article for your learning pleasure.Apr 3, 2023Apr 3, 2023
Using an Attacker’s Tools to Stop Network Attacks“Our enemies are our greatest teachers” — Dalai LamaMar 28, 2023Mar 28, 2023