The Ways I Use Mind Maps
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...
Not so long ago, a friend and colleague of mine inspired me to start using mind maps. Since then, I’ve incorporated mind maps into various workflows wherever...
Reports of My Demise…
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Spoiler: There is no quick answer to this. I’m a details guy. This won’t be short.
What had happened was… It didn’t take long to learn (or re-learn) some more interesting things, thanks to Thinkst Canary Tokens.
Whonary Tokens? Canary tokens are a concept that has been around for a while. The more generic name for them was Honeytokens. There are a few free services o...
Background Between February 2014 and February 2017, Vizio collected information about customer viewing habits through their Vizio Smart TVs, and sold that in...
This post is a “living document,” intended for me to keep a quick-and-dirty reference sheet around at all times, rather than as a standalone post. It will be...
I’ve been thinking lately about “the infosec community” because of some things I’ve read from folks on Twitter. Unlike my “DMs to myself,” posts, I’m not goi...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.This post will serv...
rtlamr Sometimes the instructions don’t register, the way they are laid out.
Deja vu One of my earlier posts described how to make the Steam client work on Mac OSX. That was pre-High Sierra, and all that was needed back then was renam...
You talkin’ to me? So there I was, minding my own business, checking my emails, when suddenly, a wild phishing attempt appears!
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I am participating in the Brakesec Book Club (@Brakesec on twitter for more info). This time around is the Hacker Playbook 3 by Peter Kim.
I’m not a big fan of Facebook due to numerous privacy concerns. I’ve gone back and forth on the subject of closing my account for some time, but as yet still...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself. I do this in an effort to keep track of interesting o...
Welcome to “DMs to myself,” where I will be going through messages from Twitter that I sent to myself in an effort not to lose interesting or valuable pieces...
Cheat-sheet version:
Privacy is an important subject to me. I am a strong opponent of the argument that “if you haven’t done anything wrong, you have nothing to hide.” All it tak...
I’ve been meaning to get these thoughts up on the blog for a bit, since transitioning from a self-hosted instance of Ghost to Jekyll-powered Github Pages. As...
As previously posted, I performed a migration from my prior setup, running Ghost, to this current setup using Jekyll as my content generator and hosting the ...
Well, that took longer than planned.
I am in the process of migrating away from Ghost. Long/short, there is too much dynamic code, and the exposure makes me uncomfortable. I’ve discovered Jekyll...
So I found myself in an interesting (and strange) thread on Twitter, the other day. I’ll be using screenshots, and hopefully I won’t get replies out of order...
Part 4: Comparison of features and traits (continued) Rather than break sections up the way reviews often are (all about option 1, then all about option 2), ...
Part 3: Comparison of features and traits (continued) Rather than break sections up the way reviews often are (all about option 1, then all about option 2), ...
Now that I’ve gone over the background and the summary of my conclusions in part 1, this post will be to analyze various aspects of the offerings themselves....
These posts are to documement my overall experience with different password storage solutions, and an amateur evaluation that I performed from the perspectiv...
I ran into an issue with the site over the weekend that, in hind sight, I should have avoided.
Immediately after I submitted a comment to Dr. Neal Krawetz’s Hacker Factor blog, I realized I had misunderstood and overlooked some important details of dif...
Maybe get the name right?
If, like me, you have ever wondered what those little brushes along the sides of escalators are for, read on. Be warned, however: The information that follow...
I recently went through the first two levels of the free intro tutorial at JQuery in order to build some basic jQuery familiarity (more on why soon). Below a...
Another instance of documentation that wasn’t fully explanatory or didn’t work. I got my SNMPv3 set up succesfully using the following in /etc/snmp/snmpd.con...
Cheat-sheet version
Cheat-sheet version: USER=$(whoami) cd /Users/${USER}/Library/Application\ Support/Steam/Steam.AppBundle/Steam/Contents/MacOS/public; ls *.res | while read l...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
This post is a result of an email exchange between me and a young professional looking to get into IT security in general and penetration testing in particul...
Cheat-sheet version: apt install fail2ban printf "[Init]\nblocktype = DROP" > /etc/fail2ban/action.d/iptables-blocktype.local service fail2ban restart
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
Spoiler warning: This will contain my solutions and explanations for the various levels in the game Untrusted. If you have not played yourself, I highly reco...
In studying for my GWAPT I was introduced by Eric Conrad to a cool educational game called Untrusted, created by Alex Nisnevich and Greg Shuflin (sorry, Greg...
I finally picked up a Wii U since the price has come down a bit and I’m hankering to play Breath of the Wild. Hooked it up to my TV + 5.1 surround sound rece...
Cheat-sheet version: Download Oracle JRE.
The current version of Ghost does not support image resizing, so the workaround for now is to use HTML tags with some CSS crammed in:
*Door slammed in face*
This is my first blog entry.