Latest — Jan 23, 2023 It's always a networking problem...unless it's not... Troubleshooting unencrypted, encrypted, and proxied network connections
My first ITSEC job... I've spent the past few weeks crafting this post because I want it to serve several purposes: 1. Giving God the glory. He's known me since before I was born and has been with me through every stumbling step. 2. Encourage anyone struggling towards a career in cyber security. TLDR,
Contemplation of circuits and society I was recently privileged with an opportunity to troubleshoot a system outside my computer lab; my car. What follows is a little walk through on how I fixed the issue as well as some philosophical musing that occurred to me while working it. Full disclosure, I'm no shade-tree mechanic. I
Securing the insecure... Using SSH tunnels to mitigate the risk posed by a device that can only talk over insecure channels.
The tension of strings and outliers... A professional musicians take on pressure and finding the right fit.
Dockering with CAS - Part 1 I've been working with and learning about SingleSignOn (aka SSO) for the past several months, specifically within a highly customized CAS SSO environment. To supplement my on-the-job training I naturally wanted to setup my very own CAS SSO infrastructure in a virtual lab. This post is a distilled version of
Tourniquet I wrote 'tourniquet' as a simple exercise for securing a booted laptop from a snatch-n-grab scenario using over-the-counter hardware. When you plug a flash-drive into a computer, the USB drivers installed on your operating system go to work identifying that device and what it's supposed to do. On a Linux