Subsequent Data Breaches

The perspective that once personal identifiable information (PII) or personal health information (PHI) has been leaked, subsequent leaks are less significant is a common one. However, there are several reasons why each new data breach remains a significant concern, regardless of past breaches. So why does each individual data breach matter?

Not every breach exposes the same set of information. One breach may leak your email address and password, while another may reveal your social security number, medical records, or financial details. Each new breach potentially adds more pieces to the puzzle of your identity, increasing the risk of identity theft or fraud.

Read More...

cybersecurity (4)

Note Taking Applications

As I delve deeper into the field of cybersecurity and penetration testing I’ve discovered that if you search Google or Youtube for “penetration testing note-taking applications” you’ll see there are a surprising number of opinions out there on which application is best. I agree with them, that a reliable note-taking app is indispensable for this sort of work, and so I’ve been on a quest to find which application actually works best for me.

Read More...

notes (1)

Why Use Strong Passwords?

During my penetration testing studies I’ve come to realize the need for strong passwords is now more important than ever. I only realized recently just how easy it is to crack a weak password.

Let me show you how easy it is to brute-force (guess) a weak password!

Read More...

cybersecurity (4)

Automate Linux Kernel Builds

I wrote a small shell script™ to automate building new Linux Kernels. I use this to build new kernels on my Debian systems:

#!/usr/bin/env bash

WORKSPACE='/home/gd/workspace'
LINUX="${WORKSPACE}/linux"

find "${WORKSPACE}" -type f \( -name 'linux-*deb' -o -name 'linux-upstream*' \) -mtime -3 -exec rm {} \;

Read More...

linux (10) kernel (5) bash (3)