Basics of Cloud Computing & Security

Abstract In recent years, cloud computing has had a significant impact on technology that businesses are attempting to take full advantage of. This paper will discuss why cloud computing is so desirable by businesses and will also discuss the potential security risks that come with it. Once we understand cloud computing and how it works... Continue Reading →

The POODLE Vulnerability

The POODLE Vulnerability Who is infected? “All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 (also known as SSLv3) with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most... Continue Reading →

Get A Password Manager!

Welcome to the 21st century! Remember back in the day when we would write down a password so we wouldn’t have to memorize it? Well let’s do that again! Just this time we are going to do it better. So a password manager is exactly what it sounds like. It is an application used to... Continue Reading →

OverTheWire Bandit Levels Explained

OverTheWire These were basically just my notes from each level that I figured I'd post just in case other people got stuck on a level or if I wanted to look back to these. Overall completing all of the levels was certainly a grind but there were plenty of nights where I just couldn't stop... Continue Reading →

Security+ SY0-501 by Darril Gibson

Security+ Get Certified Get Ahead SY0-501 Study Guide by Darril Gibson The day has come, I have, for the first time, read an entire book, since probably the third grade! You may hold the applause. This book was probably the single best source of knowledge I have come upon so far in my short life.... Continue Reading →

What’s an SQL Injection?

SQL Injection What is an SQL injection? URL encoding Types of SQL injections How basic SQL injections work   What is an SQL injection? This code injection technique is used to attack data-driven applications. Attackers can insert SQL statements into an entry field on a vulnerable website for execution. A common reason for using this... Continue Reading →

Understanding Graylog and Log Management

Log Management Tools (Graylog) As you probably know by now keeping track of logs and alerts is a crucial part of security. Therefore, having tools that allows administrators to create an efficient way to manage their logs. The tool we are going to discuss in this post is Graylog, but first let’s look at Log... Continue Reading →

HackThisSite Basic Missions!

HackThisSite.org I'll be going through the HackThisSite  basic missions in this walk-through/experience. I'll be completing all missions through the Firefox web browser. Basic Missions 1. The first basic mission is beyond easy. Simply inspect the element of the page and when you get near the password form html code there is a comment containing the... Continue Reading →

Create a website or blog at WordPress.com

Up ↑