Home

licenses & open source

Licenses are the silent architects of digital goods, quietly shaping how we share and build upon ideas. From the open arms of licenses like GNU GPL to the flexible permissions of Creative Commons, they empower creators and users, fostering collaboration and progress. They offer structure, guiding us towards a future where knowledge is shared and...

Read more

security4Life, not just business hours

Being online is by itself a vulnerability. By following these simple yet effective security practices, you can significantly reduce the risk of falling victim to common cyberattacks, safeguard your sensitive data, and navigate the digital landscape with confidence. Hardware Category Recommendations Ro...

Read more

monero (xmr) the thorn on governments feet

I am particular passioned about blockchain technology and cryptocurrency. It is revolutionary and if done right, can change the world for good. In fact, it has been doing that for years, even though we are still on an embrionary stage of development. Today, in an age where digital footprints are scrutinized and privacy feels like a luxury of th...

Read more

ransomware

Ransomware is a type of malware that encrypts or alters a victim’s data and demands a ransom from the victim to restore access. There are many different types of ransomware, and they can vary in terms of how they operate and the techniques they use to spread. Some common types of ransomware include: Encrypting ransomware: This type of ransomwa...

Read more

ransomware detection in real time

Ransomware attacks can be difficult to detect in real-time, as they often involve the attacker encrypting or altering data in a way that is not immediately noticeable. However, there are a few approaches you can take to try to detect ransomware attacks using KQL in real-time. One approach is to look for unusual changes to your system or data. F...

Read more

kql real time monitoring

KQL (Kusto Query Language) is a powerful and flexible language that can be used to query and analyze data stored in Azure Monitor logs. It is particularly useful for real-time threat detection because it allows you to quickly and easily identify patterns and anomalies in your data that may indicate a potential threat. To use KQL for real-time t...

Read more

az-500 exam prep

Index Microsoft Azure Fundamentals: Describe cloud concepts (25–30%) Azure Fundamentals: Describe Azure architecture and services (35–40%) Azure Fundamentals: Describe Azure management and governance (30–35%)     Microsoft Azure Fundamentals: Describe cloud concepts (25–30%) Shared responsibility model With the shared responsibility ...

Read more

markdown guide

Markdown guide Markdown is a plain text formatting syntax aimed at making writing for the internet easier. The philosophy behind Markdown is that plain text documents should be readable without tags mussing everything up, but there should still be ways to add text modifiers like lists, bold, italics, etc. It is an alternative to WYSIWYG (what y...

Read more

Out-of-band Application Security Testing (OAST) detection

Detection rule for Out-of-band application security testing (OAST), often used by pentesters to detect vulnerabilities. Out-of-band application security testing (OAST) uses external servers to see otherwise invisible vulnerabilities. It was introduced to further improve the DAST (dynamic application security testing) model. OA...

Read more

cybersecurity tools

Here are some of the favorites that leave on my browser. Let’s call it an assorted mix… Certificate Search Base64 Decode and Encode CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc. Find out what websites are built with - Wappalyzer IPv6 Subnet Calculator TCPView for Windows Online IP Subnet Calculator ...

Read more