Ever wondered what a virtual machine is? Well, join me for this tech talk and let’s find out!
Read MorePicture it. It was the dawn of the early internet. While computer networks had been invented, computers still could not communicate with each other. Even though the first “internet” a.k.a. ARPAnet had been invented, the implementation of such a network in the real world had not been fully realized. So, computer companies, such as IBM, […]
Read MoreIntroduction What is an intrusion detection system? Well, in it’s simplest definition an Intrusion Detection System (IDS) is a cyber burglar alarm! Now, there are different types of these cyber burglar alarms. There are host based IDSs and network based IDSs. Host based IDSs are similar to a home burglar alarm. A host based IDS’s […]
Read MoreIn today’s world, where digital threats loom large and data breaches are an unfortunate reality, safeguarding sensitive information has never been more critical. As organizations and individuals alike strive to fortify their digital defenses, the concept of “defense in depth” emerges as a fundamental strategy. At the heart of any defense in depth strategy is […]
Read MoreIntroduction Snort is a popular and powerful open-source Intrusion Detection System (IDS) that helps detect and prevent network-based attacks. Whether you are a security professional or an enthusiast, this tutorial can guide you through the process of installing and configuring Snort. By the end, you will have a functional Snort setup ready to analyze network […]
Read MoreIn today’s world, network security is critically important. An important piece of securing networks is the proper configuration of Access Control Lists (ACLs).
Read MoreSafeguarding your online activities has become more important than ever. One powerful method to safeguard your data is a Virtual Private Network (VPN).
Read MoreConfused about serverless computing? Stop! This is the only article you need! In this article I will give you a layman’s understanding of serverless computing.
Read MoreOne of the projects I have wanted to learn how to do for several years is creating a React application. However, due to a severe lack of free time I haven’t been able to. Until now. Having achieved my long awaited goal of creating my wonderful fledgling application, I now want to share that the […]
Read MoreA high-level overview of defensive programming with python.
Read More