Blog
How the Next Generation is Learning Cyber Security
Hello! Long time no see; I'm posting this article to give more insight into my talk today at AFCEA in Oklahoma.
If you're coming from the talk looking for the list of resources I've mentioned, here they are! Otherwise, I will give those who couldn't attend the scope of the word.
HAK5: The Toy’s R Us of Physical Hacking Tools
Where do hackers go to buy their toys? Is it the back alley of an old arcade with a guy missing an eye? Or is grandma selling cookies as a front but selling “internet cookies” from her latest exploit of the chromium browser? When it comes to collecting that data, it can’t all be done from the comfort of your desktop or laptop; sometimes, a physical intrusion of your target is necessary; this is where Hak5 takes the bag on physical hacking tools.
Nic’s Grill: The Journey of Finding a Delicious Burger
I must say, for a place smaller than any fancy restaurant, Nic’s Grill has way more culture and more to spare for that matter.
I do not know why, but when we first got to Nic’s it felt like a real-life version of the “Hunger Games”, with people rushing inside to get their first, ordering what they wanted, and hopefully escaping the Oklahoma heat while they’re at it.
Brisket and Ribs Done Right: Joe-Bawb’s BBQ
For generations, the art of cooking and cutting brisket and ribs have been ruined by big chain BBQ fast-food restaurants. But Joe-Bawb sticks to the classic Louisiana Cut Brisket, with delicious burnt ends and some tasty Mac-N-Cheese, Joe-Bawn seals the deal for great BBQ.
Cyber Competitions: National Cyber League
One of the things I try to work on in my spare time is CTFs, TryHackMe, and other cyber competitions. But the one I have been working on professionally for a long time is the National Cyber League (NCL), one that spans across the United States and has students from high school to college compete in various categories. NCL aims to give real-world experiences before getting a job in cyber security.
Cloud Technologies You Should Be Looking Out For
IAC is an excellent field to look after for the future of the Cloud and how we store our data.
With provisioning for cloud engineers, you want to build fast and tear down faster. With IAC or Infrastructure as Code, using languages like Terraform and DevOps, you'll be able to quickly come up with a sheet of requirements for your latest VM or project to get a running start for that new service you want to deploy.
Types of Wi-Fi attacks
Either starting up an evil twin or brute-forcing the login page of a Wireless network, wi-fi is commonly the first thing hackers will attack because of the low bar set for attacking wi-fi networks. Here’s a showcase of different ways attackers get into Non/Public wi-fi.
Public WI-FI: A Hacker’s Paradise
This article primarily focuses on those who think public wifi is secure. To those who think, 'I have nothing to hide, I don't log into any of my accounts, I'm safe right?'
To those who think that, no, no, you are not.
I’ll first list the reasons why not to use public wifi, and then I'll talk about alternatives or what you can do if Public wifi is the only option…
Wi-Fi Hygiene: Staying Secure Today with Home Wi-Fi
In August of 2021, Microsoft announced a change in how pricing works for their Microsoft and Office 365 Products.
From then on, customers had a six-month window to decide how long they wanted to commit to Microsoft 365 products, including Teams, Outlook, and various Office products. Each License brings more with higher prices, so we've broken it down to those who want to know what they're paying for with Microsoft 365.
Microsoft Licensing Increase
In August of 2021, Microsoft announced a change in how pricing works for their Microsoft and Office 365 Products.
From then on, customers had a six-month window to decide how long they wanted to commit to Microsoft 365 products, including Teams, Outlook, and various Office products. Each License brings more with higher prices, so we've broken it down to those who want to know what they're paying for with Microsoft 365.
Welcome to the TrustDigital blog site!
Today we would like to introduce to you our new blog site! Here you can catch up on the news in Cyber Security, Cloud, and many other fields that encompass the Technological World we live in today.