July 31, 2024
“The Pentester Blueprint” is a great guide for anyone interested in pursuing a career in penetration testing or cybersecurity. The book, co-authored by Kim Crawley and Phillip L. Wylie, provides a comprehensive overview of the field, from foundational knowledge and skills to the various paths one can take to become a successful pentester.
The book starts by introducing the basics of penetration testing, including the roles and responsibilities of a pentester, the skills required, and the tools commonly used in the field. As the book progresses, it delves into stories of actual penetration testers. They offer insights into their own diverse paths they took to enter the field. The authors have provided us with a collection of real-life professionals who have successfully transitioned into penetration testing from various other backgrounds. These stories are not just inspirational but also practical, offering advice and strategies that readers can apply to their own career journeys.
Read More...
cybersecurity (5) pentester (1)
July 28, 2024
I've been watching Raku since it was still Perl 6, back when Larry Wall gave his State of the Onion talk in 2000. Fifteen years from announcement to 1.0. You can defend the timeline; they were rebuilding the language from the ground up, grammars, gradual typing, a real MOP, the whole catalog, and the result is something I genuinely enjoy writing. But anyone who pretends the wait didn't have a cost is just wrong. Pugs gave us something runnable in 2005, Rakudo Star landed in 2010 but with a real 1.0 release not shipping until Christmas 2015. By then many of the developers who would have championed it had moved on. Python, for example, had already eaten the scripting world alive. The window where anyone outside the Perl tent was paying attention closed somewhere around 2008, and nobody really noticed.
Read More...
raku (17)
July 13, 2024
Using Linux for your first time can be very exciting. You suddenly gain access to a wealth of customization options, all the free
and open-source software you could ever want or need, and access to a strong community of (sometimes overly-)enthusiastic Linux users. But
before you dive headfirst into this new world, there's an important consideration I'd like to advise you on. It boils down to this: don't
"switch to Linux" on your one and only computer. Don't dual-boot it and don't bother with getting a second hard drive. In
essence, do not touch your current working computer, no matter what operating system it's running. Leave it fully operational and invest
in a cheap second computer instead. You can thank me later!
Read More...
linux (10)
July 8, 2024
The perspective that once personal identifiable information (PII) or personal health information (PHI) has been leaked, subsequent leaks are less significant is a common one. However, there are several reasons why each new data breach remains a significant concern, regardless of past breaches. So why does each individual data breach matter?
Not every breach exposes the same set of information. One breach may leak your email address and password, while another may reveal your social security number, medical records, or financial details. Each new breach potentially adds more pieces to the puzzle of your identity, increasing the risk of identity theft or fraud.
Read More...
cybersecurity (5)