Projects
- » Infosec Blogs: Our Cup Runneth Over
- » A 5 Year Infosec Education Retrospective
- » Online IT/Security Training
- » Infosec Tools
- » Mac Tools
- » Designer Vulnerabilities
- » Getting Into Information Security
Archives
» SANS MGT512 & GIAC GSLC Review
2022
» Threat Profile: Santa Claus
» Stars, Boosts & Toots
» Dynamization of Jekyll
» Boosting Your Cyber Clout
» The Enchiridion of Impetus Exemplar
» The Science of Inbox Zero
» The Shellsharks Logo Chronicles
» We're going to need a bigger blog
» Cybercomplexity
» 10-Step Getting-Into-Infosec Playbook
2021
» SANS SEC450 Review
» Cybersecurity Role Map
» SANS SEC460 & GIAC GEVA Review
» Sqlmagic, the Tamper Spell
» Shock & Awe, a Tesla Revue
» Why I Blog. You Should Too!
» SANS SEC537: Practical OSINT Review
» Surfs Up! Introducing >Shark Week
» Thoughts on WWDC 2021
» Cybersecurity Library
» Vulnerability Management Bootcamp
» HackTheBox: Laboratory
» SANS SEC588: Cloud Penetration Tester Review
» Orchestrating Enterprise Vulnerability Triage
» Desk Setup 2021
» The Zen of Inbox Zero
» Captain's Log
» HackTheBox: Academy
» Herman Miller Logitech Embody Review
» HackTheBox: Doctor
» HackTheBox: Delivery
» Infosec Blogs: Our Cup Runneth Over
» OSCP Tips
» The Shellsharks Blog and my iPad Blogging Workflow
2020
» A 5 Year Infosec Education Retrospective
» Apple Watch Hardware Progression
» Nessus is Lying to Us [Updated]
» DNS Record Injection using Nmap and Nessus
2019
» A Method for Web Security Policies (security.txt)
» Online IT/Security Training
» Exploring Minix Character Device Drivers
» Heap Buffer Overflow in VLC v0.9.4
» Stack Buffer Overflow in VLC v0.9.4
» A Primer on Intel Assembly
» An Ode to RSS
» Infosec Tools
» Thoughts on WWDC 2019
» Mac Tools
» Designer Vulnerabilities
» Getting Into Information Security