Posts

Virtual Machines: Computer in a Box

October 6, 2023

Ever wondered what a virtual machine is? Well, join me for this tech talk and let’s find out!

Read More

An Introduction to the OSI model: How the Internet was Born

September 3, 2023

Picture it. It was the dawn of the early internet. While computer networks had been invented, computers still could not communicate with each other. Even though the first “internet” a.k.a. ARPAnet had been invented, the implementation of such a network in the real world had not been fully realized. So, computer companies, such as IBM, […]

Read More

What is an Intrusion Detection System?

August 19, 2023

Introduction What is an intrusion detection system? Well, in it’s simplest definition an Intrusion Detection System (IDS) is a cyber burglar alarm! Now, there are different types of these cyber burglar alarms. There are host based IDSs and network based IDSs. Host based IDSs are similar to a home burglar alarm. A host based IDS’s […]

Read More

Multi-Factor Authentication: The core of Defense in Depth

August 19, 2023

In today’s world, where digital threats loom large and data breaches are an unfortunate reality, safeguarding sensitive information has never been more critical. As organizations and individuals alike strive to fortify their digital defenses, the concept of “defense in depth” emerges as a fundamental strategy. At the heart of any defense in depth strategy is […]

Read More

How to Install and Configure the Snort Intrusion Detection System

June 26, 2023

Introduction Snort is a popular and powerful open-source Intrusion Detection System (IDS) that helps detect and prevent network-based attacks. Whether you are a security professional or an enthusiast, this tutorial can guide you through the process of installing and configuring Snort. By the end, you will have a functional Snort setup ready to analyze network […]

Read More

How To Configure Access Control Lists (ACLs): Securing Your Network

June 22, 2023

In today’s world, network security is critically important. An important piece of securing networks is the proper configuration of Access Control Lists (ACLs).

Read More

Need to Stay Private? Learn How a VPN Protects You!

June 15, 2023

Safeguarding your online activities has become more important than ever. One powerful method to safeguard your data is a Virtual Private Network (VPN).

Read More

The Only Article You Need to Understand Serverless Computing

June 8, 2023

Confused about serverless computing? Stop! This is the only article you need! In this article I will give you a layman’s understanding of serverless computing.

Read More

How to Create a Simple React Application

June 8, 2023

One of the projects I have wanted to learn how to do for several years is creating a React application. However, due to a severe lack of free time I haven’t been able to. Until now. Having achieved my long awaited goal of creating my wonderful fledgling application, I now want to share that the […]

Read More

Defensive Programming with Python

February 4, 2023

A high-level overview of defensive programming with python.

Read More