ByteMe
-
Rachel Tobac
I recently discovered David Bombal and Rachel Tobac. They got together on a video this month and it’s great.
-
Changing Mastodon Servers
What is Mastodon? Mastodon is free and open-source software for running self-hosted social networking services. It has microblogging features similar to Twitter, which are offered by a large number of independently run nodes, known as instances, each with its own code of conduct, terms of service, privacy policy, privacy options, and content moderation policies. I
-
Kali Linux and PicoCTF
Update… This youtube video that I posted before worked absolutely beautifully on my M1 Mac. Absolutely no problems or troubleshooting. It’s not often you get a youtube tutorial that runs that seemlessly! UTM is new to me, I had always used VirtualBox in the past, but this was perfect. I’m very happy with my newly
-
PicoCTF
What is PicoCTF? picoCTF is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts at Carnegie Mellon University. It has training available for those who want to learn more about computer security. I just signed up today and followed along with this youtube to
-
Kali Linux
Disclosure: I used ChatGPT to assist in writing parts of this post. I like paying with it to see how it does. Really impressed so far! What is Kali Linux? Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is a popular choice for ethical hackers and cybersecurity professionals
-
List of Hacker Movies
I posted about a list of hacker movies back in October. Today I looked up the book on amazon, and its $10 for the kindle addition. I did a little more digging and I found the entire list published on Cybercrime Magazine for free. It includes links and a PDF download. Great fun resource to
-
How To Get Started in Information Security
Great videocast on how to get started in cybersecurity. I love this kind of information.
-
How I Earned my Certified in Cybersecurity Certificate for Free
In my company, someone posted about (ISC)2 giving away certifications. (ISC)2 is the same company that provides the CISSP and other certifications that are well-recognized by companies throughout the world. This One Million Certified in Cybersecurity initiative started at the end of August 2022 with a press release on their website. I was intrigued and
-
Access Controls
Discretionary Access Control (DAC) – A certain amount of access control is left to the discretion of the object’s owner, or anyone else who is authorized to control the object’s access. The owner can determine who should have access rights to an object and what those rights should be. Mandatory Access Control (MAC) – Access
-
Risk Treatment
Risk Treatment is making decisions about the best actions to take regarding the identified and prioritized risk. There are four types outlined below: I’m posting this because it is a concept that I have in the past been confused on. For example, mitigation and transference can be confused in the following way. If someone buys
