Jaime Cruse
May 5, 2018
Why CruSec?
CruSec was a project I kicked around in my head for a few months in mid-2017. I knew that information security was going to take...
Jaime Cruse
May 5, 2018
VLAN-ing Your Home Lab
If you ever plan on doing malware analysis, or any other activity where there is a good chance you’ll be in contact with something...
Jaime Cruse
Apr 25, 2018
Typosquatting - Why Missing Your Mark Can Be Costly
It’s happened to all of us - You’re on the web taking care of some banking, ignoring your friends’ birthdays on Facebook and catching up...
Jaime Cruse
Apr 9, 2018
Wardriving: Mobile Wireless Security Auditing
Wardriving is an activity that employs mobile hardware and reconnaissance software in a moving vehicle to search for and plot wireless...
Jaime Cruse
Mar 25, 2018
How To Set Up A Pi-hole
Pi-hole is a do-it-yourself home adblocker that can run on basic hardware, such as a Raspberry Pi. This article will discuss the install...
Jaime Cruse
Mar 19, 2018
Linux Fundamentals Part 2 - The Basics
To be entirely transparent, prior to beginning the technical portion of this series, I am using Debian-based distros and therefore much...
Jaime Cruse
Mar 12, 2018
Linux Fundamentals Part 1 – An Introduction
I can only speak for myself personally, but I found diving into Linux to be a truly excellent learning experience and was a fundamental...
Jaime Cruse
Jan 28, 2018
Leveraging Laverna For Secure Information Gathering
Laverna is an open source simple-yet-rich solution that allows for note-taking with security and privacy in mind. I’ll be discussing...
Jaime Cruse
Jan 20, 2018
Advanced Malware Removal on Windows Devices
As a disclaimer to this article, the best method of response to any malware incident is simply to wipe and reload the machine in...
Jaime Cruse
Jan 7, 2018
A Look Into The Meltdown and Spectre Vulnerabilities
What are they, and what’s the difference? Meltdown and Spectre refer to computer processor vulnerabilities that the US Computer Emergency...