May 5, 2018

If you ever plan on doing malware analysis, or any other activity where there is a good chance you’ll be in contact with something malicious, logically segregating your lab from your actual production environment is one of the most important safeguards you can implemen...

April 25, 2018

It’s happened to all of us - You’re on the web taking care of some banking, ignoring your friends’ birthdays on Facebook and catching up on the latest memes. You click on your browser’s address bar and type in Even though you’ve mentally caught the mis...

April 9, 2018

Wardriving is an activity that employs mobile hardware and reconnaissance software in a moving vehicle to search for and plot wireless networks to a GPS grid. This is a moderately inexpensive hobby that really only requires a USB GPS receiver and, optionally, an extern...

March 25, 2018

Pi-hole is a do-it-yourself home adblocker that can run on basic hardware, such as a Raspberry Pi. This article will discuss the install process as well as some of its key features.


Things you’ll need:

  • Raspberry Pi/micro-USB charger

  • Raspbian

  • Ethe...

March 19, 2018

To be entirely transparent, prior to beginning the technical portion of this series, I am using Debian-based distros and therefore much of what I cover from here on out may seem catered to them. Regardless, I’ll do my best to cover as many other bases as possible - so...

March 12, 2018

I can only speak for myself personally, but I found diving into Linux to be a truly excellent learning experience and was a fundamental step in earning a larger understanding of information systems. One hindrance I ran into was finding a single resource that provided a...

January 28, 2018

Laverna is an open source simple-yet-rich  solution that allows for note-taking with security and privacy in mind. I’ll be discussing many of its key features in detail but, first, let’s go over a few different ways the tool can be implemented. None of these methods be...

January 20, 2018

As a disclaimer to this article, the best method of response to any malware incident is simply to wipe and reload the machine in question. Due to this, redundant and reliable backups are incredibly important to both businesses and home users. There may, however, be sce...

January 7, 2018

What are they, and what’s the difference?

     Meltdown and Spectre refer to computer processor vulnerabilities that the US Computer Emergency Readiness Team (US-CERT) has described as “side-channel attacks that take advantage of the ability to extract information from...

December 28, 2017

     One of the most common questions I see people asking is “how can I practice security concepts on my own?” I think there’s a general misconception that it requires substantial investments in hardware when, really, you can get started with a mediocre laptop thanks t...

Please reload

Featured Posts

How To Get Your Start In Security

October 26, 2018

Please reload

Recent Posts
Please reload

Please reload

Please reload