Dos & Don’t(s): Here are the basic Dos & Don’t(s) of protecting your privacy when scrolling through your social media apps and sites. Dos: ~ Two-Factor Authentication ~ Using two-factor authentication whenever it’s available gives a hacker/threat actor a harder time gaining access to your account. ~ Withhold PII (Personally Identifiable Information) ~ Leave out […]
| 01.10.24 | Telegram Bot(s)
First & Foremost Happy New Year! Apologies for this uber-late post. Turns out, that building a website is very time-consuming. Today we’ll be discussing Telegram Bots. What they do, why you may need or want one, and the ones I’ve been personally developing. What Is Telegram? Telegram describes itself as a: “cloud-based mobile and desktop […]
| 12.29.24 | Ethical Hacking… Breaking In
So Begins The Journey The other day I decided to take a trip to my local Barnes & Noble to pick out a book or two. I ended up picking up two books. One of the two I picked up immediately caught my eye. The book: Ethical Hacking – A Hands-On Introduction To Breaking In, […]
| 12.22.24 | Subnets For Less Threats
Splitting My Network. Keeping today’s post short & sweet. For the past few weeks, I’ve been meaning to transfer the server I run to a separate subnetwork. The hope was to make it harder for any future hacker to laterally move across my network, should they ever get in. Now given that it is a […]
| 12.16.24 | Update
Hello all. Hope you’re keeping warm this Monday morning. Read along to find out what I ended up doing this past week. Dell Laptop Repair: I finally got around to fixing my old Dell Latitude Laptop. I’m using this laptop to run Kali Linux on it. The problem that I was having was low memory […]
The Return of the Skid
The Reappearance Hello! Long time no see! I’ve been away for a bit of a “sabbatical” for quite some time now, and I feel that I’m ready to come back & post more. While on my sabbatical, I haven’t stopped learning nor have I stopped working on my security & programming interests. On the contrary, […]
My First Tool:
Scan’N’Dos *** Educational Purposes Only *** I’ve created an automation tool in Python that streamlines port scanning and UDP flooding. This command-line-based program greets you with a namesake title banner and a menu displaying your usual startup options: ‘S’ to start, ‘H’ for help, and ‘Q’ to quit the program. Upon entering ‘S’ to start, […]
What got me interested in CyberSecurity? (Part 2)
Quick Recap In the last post, I talked about the first time I was introduced to exploiting and working my way around a system so I could not only play my favorite game but also have an advantage at it. That was just my first taste! In this post, I’ll be talking about what solidified […]
What got me interested in CyberSecurity?
This question warrants a multi-part answer. So many things contributed to my love of Cysec. I couldn’t just narrow it down to one. So I’ll be sharing several instances and “awakenings” of my journey. Think… How does the stereotypical ‘hacker’ get his or her start? Huddled up in their mom’s basement cracking OSRS? Or how […]
Funware?
What is funware? It’s malware but without the bad rep. I love to create fun scripts and files to prank my friends. Whether that be shutting off their computer or RRS’ing (Rick-Roll Spamming) their web browser to kingdom come, anything that is light-hearted and not intended to cause reprimandable damage is the way I like […]