Solving the DEFCON 2019 Volatility Memory Forensics CTF

A few months ago I found the DEFCON2019 Volatility Memory Forensics challenge and decided to take a look. Memory Forensics are a personal favorite...

Cybersecurity Project: How I broke into the field

A quick forward with some background on this before I begin; a few days ago, one of the mods of the r/cybersecurity subreddit (which I highly...

My thoughts on a decade of Cyber Security: 10 Lessons I’ve learned

I’ve spent a little more than a decade working in cyber, starting with fixing computers at my local pizza joint to leading a security...

Setting up the Training Lab for Remote Learning

Several years ago I started volunteering to help teach people an introduction to Cybersecurity. At the time it was easy to work with my...

Keeping your kids safe online

Online Safety and Kids The internet can be a scary and dangerous place, especially for kids. Our world continues to move more and more...

Can we stop saying Google sells your data now?

In the online world of data scandals and the fight for online privacy, Google has had a rough few years. Seemingly overnight the behemoth...

Is “Safe Browsing” all I need to do to stop malware?

BLUF BLUF: No safe browsing practices are a good start but even trustworthy websites can have malware. Chances are someone at some point has...

What is Double NAT and how does it affect me

If you spend anytime reading technical forums you’ve likely heard the phrase “Double NAT”. People like to talk about Double NAT like it’s the...

Is Apple really as privacy focused as they market?

The short answer: No. Apple sells advertising space the same as Google does. Most of us have probably seen this ad before: It’s simple...

Do you really need a VPN?

If you’ve spent any time on YouTube recently then chances are you’re heard a Youtuber promoting Nord VPN.  Before I begin with this, I...
WordPress Appliance - Powered by TurnKey Linux