Recently my wife and I were discussing what I'd do if I wasn't building and maintaining security systems all day. We both came to the same conclusion...I'd probably end up building and maintaining security systems all day. There has always been something about a lock that fascinates me. Perhaps
As a systems engineer with a hacker brain, I'm always excited to find and share creative ways to use/misuse tools at hand when the ideal isn't available. What follows is a product of that propensity. When testing network connectivity between systems, most of the audience of this blog is
The internet is full of sites dedicated to educating the public. This is especially true in the technology sector where bloggers and researchers spend hours crafting clean and clever projects to share with the community in hopes others can learn from their accomplishments. I've written (or tried to write) these
Troubleshooting unencrypted, encrypted, and proxied network connections
I've spent the past few weeks crafting this post because I want it to serve several purposes: 1. Giving God the glory. He's known me since before I was born and has been with me through every stumbling step. 2. Encourage anyone struggling towards a career in cyber security. TLDR,
I was recently privileged with an opportunity to troubleshoot a system outside my computer lab; my car. What follows is a little walk through on how I fixed the issue as well as some philosophical musing that occurred to me while working it. Full disclosure, I'm no shade-tree mechanic. I
Cooking up some code with Flask to demonstrate Apache load-balancing.
Using SSH tunnels to mitigate the risk posed by a device that can only talk over insecure channels.
A professional musicians take on pressure and finding the right fit.
iSpy Agent DVR docker setup running as a service