Detecting Intruders

I wanted to go back over your devices listening to you, but this time focus on malicious actors. This is a far more common way that people are actually victims. There are websites where you can see unsecured webcams, and unsecured printers used to be popular targets for vandals too. I feel like this also… Continue reading Detecting Intruders

Private, Public, and Hybrid Cloud Architectures

Putting your information on a far away server can be scary unless you understand how they operate. There are three different types of cloud architectures good for different uses: public, private, and hybrid. The primary difference is who can access the data. Public data do not hide their data from anyone, and can be great… Continue reading Private, Public, and Hybrid Cloud Architectures

The future of AI and VISHING (Voice Phishing)

A connection on LinkedIn recently brought up the point that he believes AI will make Vishing a greater threat against corporations in the future. His argument is based on how AI is making everything easier nowadays. As it improves its ability to communicate with humans, it can become yet another attack vector that is an… Continue reading The future of AI and VISHING (Voice Phishing)

Linux Auth Servers Options

When you’re running a server for an app you may need to consider authentication servers. An authentication server is a server that is designed to ensure information is delivered only to an intended party. Typically, authentication occurs by passing a certification from the device or user to the server. A valid certification should require both… Continue reading Linux Auth Servers Options

Portfolio and Resume Advice from Experience

One thing I’ve noticed interacting with people on LinkedIn is that portfolios are kind of the darkside of programming. They’re absolutely essential for landing an internship or even a job, but assembling one let alone representing one can be daunting, and keep you up after midnight. Much like a first date it can be easy… Continue reading Portfolio and Resume Advice from Experience

A Brief Introduction to Social Engineering

I remember being in Math class when I first read the name Anna Sorokin, and I blew it all off as nothing. Con artists are nothing new, and aside from the fact she took on some massive banks the same applied to her. While Inventing Anna was one of the funniest things I’ve seen in… Continue reading A Brief Introduction to Social Engineering

New IT Content on the Way

I published a summary on DDoS attacks. It’s not the most comprehensive article of all time, but it should be enough to get you through CompTIA certification on the subject. To summarize the article, a single device in a botnet is referred to as a zombie. Zombies can be controlled remotely, and their resources are… Continue reading New IT Content on the Way