Andrew Solomon opened his famous Ted talk by reciting a poem written by Emily Dickinson and for some reason it stuck with me since the first time I heard it. If you have some time, watch the full talk, you won't regret it.
My home network always had a simple security setup, a router, a firewall, and a bunch of computers. After months of ignoring it, I finally got around to reviewing the setup and making some improvements.
If you are an aspiring web developer, security engineer, or web application penetration tester, Web Security For Developers is a great place to start learning about the most important topics that will follow you for the rest of your career.
The events that transpired this week in the US are sad and depressing to say the least, but criticizing people for forgetting to lock a computer in such a situation isn't a wise move. Life preservation takes precedence over security policies, full stop.
Happy new year, hopefully.
MISP is a great platform for intelligence sharing and collaboration. I have had it on my mind for a while now but only today did I get the chance to learn more about it. This post is the first in many to come about MISP and use cases I will be building around it.
We all need a way to send our friends the latest memes but that doesn't mean we should sacrifice our privacy and data control while doing so. In this post, I share some of the services I use to protect my privacy and remain productive.
One question in CyberDefender's most recent challenge taught me something new. The question asked you to listen to the audio stream that can be found in the PCAP file to find the flag and claim the points. I never knew Wireshark supports doing this hence this TIL.
The way pinned messages work in Slack is one of the things I find frustrating about the platform. If I pin a message, I expect it to remain visible in the channel not tucked into a side tab. This post outlines a rough PoC for a Slack application that can help you "truly" pin your messages.
It's been a while since I did any forensic challenges, so I was excited when I saw this new challenge from CyberDefenders. Even though I never did any macOS forensics, I did quite well on this challenge (solved 14/16 questions) and learned a bunch. This post is my attempt at a quick recap.