• Explaining the CompTIA Troubleshooting Method (CompTIA A+)

    The CompTIA troubleshooting method is a systematic approach used to diagnose and resolve issues, particularly in the field of IT. This method ensures that problems are handled in a structured and efficient manner, minimizing downtime and ensuring that issues are resolved effectively. The CompTIA troubleshooting method consists of the following steps: 1. Identify the Problem…

  • Understanding Linux Permissions: A Brief Overview

    Linux, an open-source operating system, is widely recognized for its security, stability, and flexibility. One of the key elements contributing to its robust security model is the implementation of permissions. Linux permissions regulate access to files and directories, ensuring that only authorized users can perform specific actions. This blog post delves into the intricacies of…

  • Unlocking the World of Locksport: A Fascinating Journey into the Art of Opening Locks

    Locks have been a crucial part of human civilization for centuries, safeguarding our homes, valuables, and secrets. While the primary purpose of locks is to provide security, there exists a unique community of individuals who view them as more than just deterrents to would-be intruders. Welcome to the captivating world of Locksport – an engaging…

  • 404, Security Not Found: The Abysmal State of Internet of Things Security and Methods for Improvement

    Note: This was written for a university assignment, and is available for academic use. Abstract As the Internet and connected devices become ubiquitous in the modern world, it is vital that a user’s privacy is protected from online security threats. Over the last decade, breaches in security of Internet of Things (IoT) devices (including baby…

  • Malware Thru The Ages — 1969–2017

    Introduction: This essay is intended to provide the reader with a history of malware, starting with the famous “Creeper” worm in 1971 and ending with the 2017 WannaCry Ransomware. Malware has evolved throughout the years to meet the demands of more complex computing machines. Progressing from entities that could only be spread via floppy disk…

  • Basics of OSINT Essay

    Introduction In an Open-Source Intelligence Investigation (OSINT) there will be several steps to follow and may vary depending on business needs, field, and required deliverables. The book Open-Source Intelligence Techniques by Michael Bazzell describes an effective framework for developing a workflow of an OSINT investigation. Although investigation scope, timeframe, and deliverables may change, having a…

  • Python3 – Example of Index, add/remove from index, get input from a user

  • Hello world!

    Mer. Print(“hello world”)