What is an Electronic Press Kit or EPK

In the old days, physical press kits were paper-based and mailed old skool. Today, music artists can use digital media for promotion. This is known as an electronic press kit, or EPK. What is an EPK? An Electronic Press Kit is a digital resume for all audiences that is the promotional materials, giving everyone an Read More …

NOTES :: Retrieval Augmented Generation (RAG)

A solution model pattern in how to leverage large language models. Systems that use LLM but on their own content. Start Large language models can be inconsistent. Sometimes they nail the answer to questions, other times they regurgitate random facts from their training data. If they occasionally sound like they have no idea what they’re Read More …

AWS Notes – AWS Pentesting

An Opinionated Ramp Up Guide to AWS Pentesting https://awssecuritydigest.com/articles/opinionated-ramp-up-guide-to-aws-pentesting https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58 Understanding the Shared Responsibility Model https://www.wiz.io/academy/shared-responsibility-model fwd:cloudsec https://fwdcloudsec.org/ AWS Customer Support Policy for Penetration Testing https://aws.amazon.com/security/penetration-testing/ Also, read this and follow the AWS pentesting rules. Cloud Tests One is a review of the external facing posture, which you can consider adjacent to a traditional External Read More …

AuKill EDR Post

Summary AuKill is a malicious software, often used by ransomware groups, designed to disable endpoint detection and response (EDR) security solutions on a system, essentially allowing attackers to bypass security measures before deploying ransomware by terminating EDR processes using a vulnerable, outdated driver like the Process Explorer driver from Sysinternals; effectively “killing” the EDR functionality.  Key points about Read More …

Notes on “Paved Road”

Lessons from Securing Internal Applications WebappSec Link Building a Security Platform Engineering Team “”” I’m a big fan of building security into existing processes, a term coined as “secure paved roads” by Jason Chan, Ex-Netflix CISO. The idea behind this is that security should mostly be invisible. The average employee should simply not have to Read More …

Notes – Limiters

With acoustic guitars you will hear some strums that are really loud and some strums that aren’t quite as loud.  It could be very well played but you will still have some variation between strums.  Sometimes the dynamic is quite loud and a compressor sometimes just can’t get a hold of that because the difference Read More …

What is DTLS and where do I use it?

It’s best suited for small- to medium-sized businesses with deployments that range from tens to a few hundred computers. A provisioning package (. ppkg) is a container for a collection of configuration settings. Use the Windows Configuration Designer tool to create provisioning packages to easily configure devices running Windows client. Windows Configuration Designer is primarily Read More …

Want to Learn Linux

Here are some sources to get you started! Thanks to @simonholdorf for the links! Linux Operating System – Crash Course for Beginners The Complete Linux Course Linux Command Line Full course Linux File System/Structure Explained! Linux for Ethical Hackers (Kali Linux Tutorial)