In the technical world, we often distinguish between “allocated memory” and “active throughput.” A system might have plenty of resources reserved, but if the data isn’t actually flowing through the pipes, the system just stalls. In finance, Operating Cash Flow (OCF) is that throughput. It is the actual cash moving into and out of the Read More …
Category: Computers
PKCE – Proof Key for Code Exchange
Securing OAuth 2.0 for the Modern Web In the world of Information Security, acronyms often act as gatekeepers to critical concepts. One of the most vital for modern identity management is PKCE (pronounced “pixie”), which stands for Proof Key for Code Exchange. If you are new to the field, you likely know that OAuth 2.0 Read More …
How to Talk to a Robot: A Guide to Prompting
If you think of an AI like a giant, digital brain, Prompting is simply the art of asking the right questions to get the best answers. Again let’s think of the AI as the brilliant but literal intern. If you give a vague instruction, you’ll get a vague result. If you give clear, clever instructions, Read More …
Frankenmap
Modern Intrusion Detection Systems (IDS) easily spot the distinct signatures of Nmap’s default aggressive probes. Here is a stealth blueprint for getting OS, version, and script data without kicking the front door down: 1. Deconstructing the Aggressive Scan Instead of using -A, use these specific flags to control exactly what information is gathered and how Read More …
THE SILICON RAVEN
A TALE OF THE GREAT EXTINCTION By Edgar Allan Poe Upon a midnight dreary, while Kevin pondered, weak and weary, Over many a quaint and curious volume of forgot-user-lore— While he nodded, nearly napping, suddenly there came a tapping, As of some core-processor snapping, snapping at the server door. “’Tis some glitch,” he muttered, blinking Read More …
FCF – Free Cash Flow
In the technical world, we often measure success through uptime, sprint velocity, or mitigation rates. However, as we all transition into a leadership role, the primary metric of success shifts toward value creation. To speak the language of the C-suite, one term you must understand is Free Cash Flow (FCF). Think of FCF as the Read More …
NMAP discovery options
I will break down the options for each command. Command 1: sudo nmap -sn 10.0.0.* -oG – | awk ‘/Up$/{print $2}’ –discovery-ignore-rst Summary: This command is used to build a list of “up” machines on a specific subnet (in this case, 10.0.0.*). Breakdown: sudo nmap -sn 10.0.0.*: Performs a simple ping scan (-sn) on the Read More …
THE GREAT SILENCE
A DISPATCH FROM THE AGE OF ENLIGHTENMENT By Mark Twain It has been precisely seven days since the “Information Super-Highway” suffered a head-on collision with a tortoise named Speedy. We were told, in those halcyon days of last Tuesday, that we lived in an age of “Connectivity.” It turns out that connectivity is much like Read More …
Understanding the business
In the 2004 satirical film A Day Without a Mexican, the state of California grinds to a halt when its Hispanic population vanishes, proving that a group often relegated to the background is actually the backbone of the economy. In the modern corporate world, IT departments potentially face a similar paradox. We are often viewed Read More …
Prompt Chaining: A Conversation with AI
Most people treat AI like a Google search: you type a question, get an answer, and you’re done. If you want the AI to do something truly impressive; like plan a wedding, write a business plan, or solve a complex logic puzzle, you can’t do it in one go. You need Prompt Chaining. Think of prompt Read More …