licenses & open source
Licenses are the silent architects of digital goods, quietly shaping how we share and build upon ideas. From the open arms of licenses like GNU GPL to the flexible permissions of Creative Commons, they empower creators and users, fostering collaboration and progress. They offer structure, guiding us towards a future where knowledge is shared and...
security4Life, not just business hours
Being online is by itself a vulnerability. By following these simple yet effective security practices, you can significantly reduce the risk of falling victim to common cyberattacks, safeguard your sensitive data, and navigate the digital landscape with confidence.
Hardware
Category
Recommendations
Ro...
monero (xmr) the thorn on governments feet
I am particular passioned about blockchain technology and cryptocurrency. It is revolutionary and if done right, can change the world for good. In fact, it has been doing that for years, even though we are still on an embrionary stage of development.
Today, in an age where digital footprints are scrutinized and privacy feels like a luxury of th...
ransomware
Ransomware is a type of malware that encrypts or alters a victim’s data and demands a ransom from the victim to restore access. There are many different types of ransomware, and they can vary in terms of how they operate and the techniques they use to spread.
Some common types of ransomware include:
Encrypting ransomware: This type of ransomwa...
ransomware detection in real time
Ransomware attacks can be difficult to detect in real-time, as they often involve the attacker encrypting or altering data in a way that is not immediately noticeable. However, there are a few approaches you can take to try to detect ransomware attacks using KQL in real-time.
One approach is to look for unusual changes to your system or data. F...
kql real time monitoring
KQL (Kusto Query Language) is a powerful and flexible language that can be used to query and analyze data stored in Azure Monitor logs. It is particularly useful for real-time threat detection because it allows you to quickly and easily identify patterns and anomalies in your data that may indicate a potential threat.
To use KQL for real-time t...
az-500 exam prep
Index
Microsoft Azure Fundamentals: Describe cloud concepts (25–30%)
Azure Fundamentals: Describe Azure architecture and services (35–40%)
Azure Fundamentals: Describe Azure management and governance (30–35%)
Microsoft Azure Fundamentals: Describe cloud concepts (25–30%)
Shared responsibility model
With the shared responsibility ...
markdown guide
Markdown guide
Markdown is a plain text formatting syntax aimed at making writing for the internet easier. The philosophy behind Markdown is that plain text documents should be readable without tags mussing everything up, but there should still be ways to add text modifiers like lists, bold, italics, etc. It is an alternative to WYSIWYG (what y...
Out-of-band Application Security Testing (OAST) detection
Detection rule for Out-of-band application security testing (OAST), often used by pentesters to detect vulnerabilities.
Out-of-band application security testing (OAST) uses external servers to see otherwise invisible vulnerabilities. It was introduced to further improve the DAST (dynamic application security testing) model.
OA...
cybersecurity tools
Here are some of the favorites that leave on my browser. Let’s call it an assorted mix…
Certificate Search
Base64 Decode and Encode
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.
Find out what websites are built with - Wappalyzer
IPv6 Subnet Calculator
TCPView for Windows
Online IP Subnet Calculator
...
20 post articles, 2 pages.