Recently I attended a Camp IT Conference hosted at the Stephens Convention center in Rosemont Illinois. This particular conference was Disaster Recovery / Business Continuity – Resilient Infrastructure. While the Convention center in Rosemont is cavernous, our group was off to the side in the Executive areas. Next time I will remember to take photos! Read More …
Category: Computers
Getting Started :: Other Computer Things to think about
Some other Computer Things to think about. Surge Protectors I have been super please with this one as of late. I do not get any $ for recommending things. Hopefully this site stays that way. Uninterrupted Power Supply (UPS) External Drive or Cloud Storage For this, it is important to have something where whatever you upload Read More …
Windows Stuff from GREM Exam
Here are some of the Windows API things that I have on older flashcards that I am adding to this site. Yes. flashcards. I used them to pass my GREM exam from SANS. GetAsychKeyState GetProcAddress Memory Registers EIP
Want to Learn Python
@simonholdorf for these 20 Beginner Python Projects 3 Python Automation Projects – For Beginners 15 Python Projects in Under 15 Minutes 5 Unique Python Projects 12 Beginner Python Projects 5 Mini Python Projects – For Beginners
Want to Learn Linux
Here are some sources to get you started! Thanks to @simonholdorf for the links! Linux Operating System – Crash Course for Beginners The Complete Linux Course Linux Command Line Full course Linux File System/Structure Explained! Linux for Ethical Hackers (Kali Linux Tutorial)
2022 Defcon Video Playlist
For those who do now know of Defcon, this is the Hacker conference that started them all. Just a quick post of the Video Playlist from this year’s conference. Sick Codes – Hacking the Farm = Breaking Badly into Agricultural Devices Aviv Sassoon -The Journey From Isolated Container to Cluster Admin Wietze Beukema – Save Read More …
Find an APT
MITRE Groups Thai CERT – Electronic Transactions Development Agency
Twitter Tips
You can upload your email list to Twitter for targeted advertising but you have to remember that you are handing the Information to Twitter as well. Your email list is no longer just yours. You can target users that have searched for specific keywords or you can exclude keywords as well. +music +studio -lessons
Notes :: Getting around some Defenses
Trying to read up on this for some work things. Dropping a few links here. Will add more notes as I go on. —————————————————————— bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis “”” It’s worth noting that not all the functions get hijacked by AVs/EDRs. Usually only those functions that are known to be abused over and over again in the wiled that Read More …