Decoupling CI/CD from deployment allows teams to build, test, and deploy code changes independently, offering more flexibility and control over releases, enabling faster feedback loops and risk reduction. Why Decouple? Improved Control and Stability: By separating deployment (moving the code to production) from release (making the code available to users), teams can deploy new versions of Read More …
Author: tmack
What is Network Address Translation
Network Address Translation (NAT) is a method used in networking to modify the IP address information in the headers of data packets as they traverse a router. NAT allows multiple devices on a local network to share a single public IP address, facilitating efficient use of IP address space and adding a layer of security Read More …
Conference Video – Dirty Secrets They Didn’t Teach You In Class
This talk is about methodologies and tools that we use or have coded that make our lives and pentest schedule a little easier, and why we do things the way we do. Of course, there will be a healthy dose of Metasploit in the mix.
What is a VPN?
A Virtual Private Network, commonly referred to as a VPN, is a technology that creates a secure and encrypted connection between your device and the internet. It acts as a private tunnel for your online activities, shielding them from prying eyes and potential cyber threats. Originally developed to enable secure communication within corporate networks, VPNs Read More …
Conference Video – Fantastic OSINT and where to find it
Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.
UDP and Its Role in Online Communication
The User Datagram Protocol (UDP) is one of the foundational protocols of the internet, widely used for applications where speed and efficiency are prioritized over reliability. This article explores what UDP is, how it works, and why it is often chosen over Transmission Control Protocol (TCP) for specific use cases, particularly in online communication and Read More …
Conference Video – OSINT: Oh the places you’ll go
Justin Brown (Spridel) Open Source Intelligence (OSINT) is what many of us do on a daily basis. We may not acknowledge it. We perform research, digital foot printing, competitive intelligence, and reconnaissance, just to name a few. Come find some additional resources for your efforts, listen to what should be collected, how to perform collection, Read More …
Hacker Video – Theme: Big Breaks
A video I uploaded for my dear friend Cory Doctorow, from the Moth Story-telling competition.
The Internet Protocol: The Backbone of Online Communication
The Internet Protocol (IP) is one of the most essential components of modern networking, enabling seamless communication between devices across the globe. This article explores what the Internet Protocol is, how it works, and why it is crucial for online communication. What is the Internet Protocol? The Internet Protocol (IP) is a set of rules Read More …
Conference Video – Introductory Netflow Analysis
Miles Johnson Introductory Netflow Analysis is a 1 hour presentation on the basic concepts of Netflow and network forensics using netflow logs. All IT Security professionals will need to do network forensics at one time or another. Netflow analysis can empower you to discover and understand past network behavior.