This is a presentation I’ve been doing at a few infosec events recently. I talk about how hackers and stalkers harass you online, and how they get int...
In this episode: I discuss why you should be testing your web application security, and perform periodic vulnerability scans. This one is short, and t...
Security in Depth is Failing I’m back after fighting a cold for the past two weeks. I talk about how Security in Depth is Failing, and the reasons for...
The SHA-1Sum SHA-1Sum is a Linux that calculates and verifies SHA-1 hashes. It is commonly used to verify the integrity of files. The has values shou...
lsof and fuser commands in Linux – Episode 2 Show Notes lsof is a command in Linux that lists open files. running lsof gives you information such as C...
Network Security Logging Network Security Logging is one of the basic elements you should have for your infrastructure. Proper logging of your network...