It’s always good to know where random credit card numbers live on your network, even if PCI compliance isn’t a concern for you. Any unencrypted credit card information should be purged from the network to prevent accidental disclosure. I have…
Here are a couple tips courtesy @HanseSecure for using NMAP and avoiding firewalls.
I know I’ve said I do not like pain…but I must be a massicist for moving almost everything I do into something self-hosted. Why on earth would anyone do this to themselves?
This book contains a number of valueable concepts for those new to IT as well as those who have been around for a while. While the book is somewhat dated technically (circa 2005), the advice is not. Topics range from…
Why Jekyll? Jekyll makes sense for me. Operationally, I want a a low overhead to generating and publishing my content. I want to be able to maintain a backup copy of my site without having to setup a duplicate WordPress…
General Pick an MTA that supports the options described below, and configure them appropriate to your situation. Leave room for exceptions as not everyone on the internet will come close to running a complaint MTA. You will always have a…
Leveraging the FFIEC Cybersecurity Assessment Tool to develop a security improvement roadmap
The FFIEC’s Cybersecurity Assessment Tool is an excellent tool to not only determine your organization’s security maturity level but also help develop a roadmap for increasing overall security levels.
Echo in Ramadi: The Firsthand Story of US Marines in Iraq’s Deadliest City by Scott A. Huesing Echo In Ramadi details the hell on earth faced by Echo Company, Second Battalion, Fourth Marine Regiment during 2006. This book is very dear to…
A great deal has changed in the last two months for the better. My family has completed our move to the South Carolina and we are loving all of it. There is still a good amount of adjustment to do,…
What did I learn by going thru a NERC CIP audit? A lot…