A video I uploaded for my dear friend Cory Doctorow, from the Moth Story-telling competition.
Tag: 31ric
Conference Video – Introductory Netflow Analysis
Miles Johnson Introductory Netflow Analysis is a 1 hour presentation on the basic concepts of Netflow and network forensics using netflow logs. All IT Security professionals will need to do network forensics at one time or another. Netflow analysis can empower you to discover and understand past network behavior.
Hacker Video – All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …
Notes – AWS Systems Manager Session Manager
Session Manager is a fully managed AWS Systems Manager tool. With Session Manager, you can manage EC2 instances, edge devices, on-premises servers, and VMs. You can use either an interactive one-click browser-based shell or the AWS Command Line Interface. Session Manager provides secure node management without the need to open inbound ports, maintain bastion hosts, Read More …
TCP: The Backbone of Reliable Communication
The Transmission Control Protocol (TCP) is a fundamental part of internet communication, ensuring reliable data exchange between computers and systems. This article will go into some brief details on what TCP is, how it works, and its critical role in enabling seamless communication across networks. What is TCP? Transmission Control Protocol (TCP) is one of Read More …
Hacker Video – Exploiting Network Surveillance Cameras
Exploiting Network Surveillance Cameras Like a Hollywood Hacker
DHCP and Its Role in Network Functionality
The Dynamic Host Configuration Protocol (DHCP) is an essential component of modern networking, ensuring that devices can seamlessly connect and communicate within a network. This article explores what DHCP is, why it is critical for networks to function efficiently, and how to configure basic DHCP settings on a home router. What is DHCP? DHCP stands Read More …
Hacker Video – Analyzing Meterpreter with Redline
A victim VM has been deliberately infected with Meterpreter via an IE exploit. The video shows copying over a Redline collector to extract forensic artifacts and save them to network share. The artifacts are then imported to an analysis workstation over sftp and opened in Redline. The analysis starts at the highest malicious score to Read More …
CPU :: The Brain of Your Computer
If a computer were a human body, the Central Processing Unit, or CPU, would be its brain. The CPU is one of the most critical components in any computer, responsible for carrying out instructions and ensuring everything works together smoothly. Let’s explore what the CPU is, what it does, and how it functions in a Read More …