2021 Update to my Home Network

About a year ago I decided to take a moment to look back at how my network engineering has progressed throughout the years. That...

Should you run malware in Windows Sandbox?

In Windows 10 update 1903 Microsoft introduced a new security feature for Windows Pro and Enterprise users. That feature is Windows Sandbox. Windows Sandbox...

The Issues with Security by Abstinence

Today I want to talk about a prevailing concept in security that I’m hereby referring to as security by abstinence. I know this is...

Further Securing Pi-Hole Access from Internet

Forward Over the course of the last year (year and a half) I’ve been working on methods to securely access my Pi-Hole admin interface...

Securing Pi-Hole Admin interfaces on the Internet

Introduction A while ago I wrote an article on how to access your Pi-hole interface from the internet securely. At the time of this...

Accessing Pi-Hole admin interface from the internet securely

Intro Everyone so often on the r/pihole subreddit you’ll see someone posting about how they discovered an admin interface in the wild, or there...

Solving the DEFCON 2019 Volatility Memory Forensics CTF

A few months ago I found the DEFCON2019 Volatility Memory Forensics challenge and decided to take a look. Memory Forensics are a personal favorite...

Cybersecurity Project: How I broke into the field

A quick forward with some background on this before I begin; a few days ago, one of the mods of the r/cybersecurity subreddit (which I highly...

My thoughts on a decade of Cyber Security: 10 Lessons I’ve learned

I’ve spent a little more than a decade working in cyber, starting with fixing computers at my local pizza joint to leading a security...

Setting up the Training Lab for Remote Learning

Several years ago I started volunteering to help teach people an introduction to Cybersecurity. At the time it was easy to work with my...
WordPress Appliance - Powered by TurnKey Linux