The Pentester Blueprint

“The Pentester Blueprint” is a great guide for anyone interested in pursuing a career in penetration testing or cybersecurity. The book, co-authored by Kim Crawley and Phillip L. Wylie, provides a comprehensive overview of the field, from foundational knowledge and skills to the various paths one can take to become a successful pentester.

The book starts by introducing the basics of penetration testing, including the roles and responsibilities of a pentester, the skills required, and the tools commonly used in the field. As the book progresses, it delves into stories of actual penetration testers. They offer insights into their own diverse paths they took to enter the field. The authors have provided us with a collection of real-life professionals who have successfully transitioned into penetration testing from various other backgrounds. These stories are not just inspirational but also practical, offering advice and strategies that readers can apply to their own career journeys.

Read More...

cybersecurity (5) pentester (1)

Raku: Why It Hasn't Caught On

In the vast realm of modern programming languages, some rise to prominence while others remain forever in the shadows. Raku, initially named Perl 6, is one such language that, despite its powerful features, has failed to gather a developer base large enough to cause the language to become mainstream. Here's my take on why Raku has failed to catch on, based on personal experience, observation, and lots of waiting.

Read More...

raku (17)

Do Not "Switch To Linux"

Using Linux for your first time can be very exciting. You suddenly gain access to a wealth of customization options, all the free and open-source software you could ever want or need, and access to a strong community of (sometimes overly-)enthusiastic Linux users. But before you dive headfirst into this new world, there's an important consideration I'd like to advise you on. It boils down to this: don't "switch to Linux" on your one and only computer. Don't dual-boot it and don't bother with getting a second hard drive. In essence, do not touch your current working computer, no matter what operating system it's running. Leave it fully operational and invest in a cheap second computer instead. You can thank me later!

Read More...

linux (10)

Subsequent Data Breaches

The perspective that once personal identifiable information (PII) or personal health information (PHI) has been leaked, subsequent leaks are less significant is a common one. However, there are several reasons why each new data breach remains a significant concern, regardless of past breaches. So why does each individual data breach matter?

Not every breach exposes the same set of information. One breach may leak your email address and password, while another may reveal your social security number, medical records, or financial details. Each new breach potentially adds more pieces to the puzzle of your identity, increasing the risk of identity theft or fraud.

Read More...

cybersecurity (5)