So all of the folks of wisdom say that the stock market always goes up in the long run, although with plenty of unpredictable bumps along the way. Since you can’t predict those bumps until after they happen, there is no point in trying to dance in and out of it. In other words, the Read More …
Category: Learn
SMS Phishing or Spam
I just received an awesome SMS phishing message scam, and I wanted to share with others, to show how to spot the scam. To the right is a photo of it: First, I do read the whole message, and in the second reading that we can really pick it apart. So the message claims to Read More …
What is SEO Poisoning?
SEO Poisoning (or Search Engine Optimization Poisoning) is a type of social engineering attack that targets an unsuspecting user, or maybe someone who is in a hurry and not paying close attention. These are typically used by bad guys to fool unsuspecting users into clicking their links and going to the wrong website, or worse Read More …
Social Media Articles of Late
You can choose to follow their idea or not… Hypebot Image Chart – Just the chart man. Here is one article suggesting the times you should publish your posts. A quick Ad Tip :: “Build and test your audiences as much as you can 1st before you actually buy the ad. You want to make Read More …
Windows Stuff from GREM Exam
Here are some of the Windows API things that I have on older flashcards that I am adding to this site. Yes. flashcards. I used them to pass my GREM exam from SANS. GetAsychKeyState GetProcAddress Memory Registers EIP
Want to Learn Python
@simonholdorf for these 20 Beginner Python Projects 3 Python Automation Projects – For Beginners 15 Python Projects in Under 15 Minutes 5 Unique Python Projects 12 Beginner Python Projects 5 Mini Python Projects – For Beginners
Want to Learn Linux
Here are some sources to get you started! Thanks to @simonholdorf for the links! Linux Operating System – Crash Course for Beginners The Complete Linux Course Linux Command Line Full course Linux File System/Structure Explained! Linux for Ethical Hackers (Kali Linux Tutorial)
What is in a Split Sheet
Song title Date the song was created Names of all involved parties and their role artists, songwriter, producer Publishing info for all involved. Ascap, emi, bmi etc. Contact information Name, Phone, Email, Address Signature of acceptance and the date. All parties get a signed letter. Tip :: I heard that these can also be Read More …
Hello from the Bedroom Rocker!
I just went ahead and ran the auto installer cause I am tired of procrastinating. I know I could do it manually, I just haven’t done it, and I don’t have a good reason for that. The Scriptaculous installer had given me a tone of problems with file permissions. Didn’t matter what theme I chose Read More …
Notes :: Getting around some Defenses
Trying to read up on this for some work things. Dropping a few links here. Will add more notes as I go on. —————————————————————— bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis “”” It’s worth noting that not all the functions get hijacked by AVs/EDRs. Usually only those functions that are known to be abused over and over again in the wiled that Read More …