-
Explaining the CompTIA Troubleshooting Method (CompTIA A+)
The CompTIA troubleshooting method is a systematic approach used to diagnose and resolve issues, particularly in the field of IT. This method ensures that problems are handled in a structured and efficient manner, minimizing downtime and ensuring that issues are resolved effectively. The CompTIA troubleshooting method consists of the following steps: 1. Identify the Problem…
-
Unlocking the World of Locksport: A Fascinating Journey into the Art of Opening Locks
Locks have been a crucial part of human civilization for centuries, safeguarding our homes, valuables, and secrets. While the primary purpose of locks is to provide security, there exists a unique community of individuals who view them as more than just deterrents to would-be intruders. Welcome to the captivating world of Locksport – an engaging…
-
404, Security Not Found: The Abysmal State of Internet of Things Security and Methods for Improvement
Note: This was written for a university assignment, and is available for academic use. Abstract As the Internet and connected devices become ubiquitous in the modern world, it is vital that a user’s privacy is protected from online security threats. Over the last decade, breaches in security of Internet of Things (IoT) devices (including baby…
-
Malware Thru The Ages — 1969–2017
Introduction: This essay is intended to provide the reader with a history of malware, starting with the famous “Creeper” worm in 1971 and ending with the 2017 WannaCry Ransomware. Malware has evolved throughout the years to meet the demands of more complex computing machines. Progressing from entities that could only be spread via floppy disk…
-
Basics of OSINT Essay
Introduction In an Open-Source Intelligence Investigation (OSINT) there will be several steps to follow and may vary depending on business needs, field, and required deliverables. The book Open-Source Intelligence Techniques by Michael Bazzell describes an effective framework for developing a workflow of an OSINT investigation. Although investigation scope, timeframe, and deliverables may change, having a…
-
Python3 – Example of Index, add/remove from index, get input from a user
-
Hello world!
Mer. Print(“hello world”)