blog.pentestify.com
Getting started in information security…. notes to a student | PENTESTIFY BLOG
https://blog.pentestify.com/2014/03/07/getting-started-in-security-a-message-to-a-student
A Logging IRC Bot with Cinch. Bulk elasticsearch file split →. Getting started in information security…. notes to a student. March 7, 2014. Recently had a college student reach out for advice, and thought i’d share with the class:. Cool – sounds like the biggest thing is to explore your options, and decide on a direction knowing full well this may change as you learn more. You may want to try writing your current goals down, and working toward them (or, better yet, backward from the end result). 8211; th...
taylor.wordpress.com
About | Taylor Banks
https://taylor.wordpress.com/about
Info for, of, by, and possibly about Taylor Banks. I am a member of the ATP. And served as the Director of Web Operations for the Metro Atlanta ISSA. I am also the Administrator of the DC404. Group, and the founder of kaos.theory security.research. I have been a speaker and/or volunteer at DEF CON. And am available for future speaking engagements on information security, privacy and related topics. I invite you to visit these sites and welcome your questions, feedback and participation! Where to find me.
narknet.org
NarkNet - Passive Wi-Fi Surveillance FAQ
http://www.narknet.org/faq.html
Nark [verb] slang - to serve or behave as a spy or informer. Net [noun] a computer network. Plusmn; Where can I get a copy of the NarkNet presentation slides? You can get a copy of the NarkNet presentation slides here. On my Georgia Institute of Technology. Plusmn; Why do you use the ip and iw commands in the NarkNet presentation? When people read the NarkNet presentation. They notice that the demonstration uses the ip. Commands rather than the traditional ifconfig. IPROUTE2 Utility Suite Howto. NarkNet ...
narknet.com
NarkNet - Passive Wi-Fi Surveillance FAQ
http://www.narknet.com/faq.html
Nark [verb] slang - to serve or behave as a spy or informer. Net [noun] a computer network. Plusmn; Where can I get a copy of the NarkNet presentation slides? You can get a copy of the NarkNet presentation slides here. On my Georgia Institute of Technology. Plusmn; Why do you use the ip and iw commands in the NarkNet presentation? When people read the NarkNet presentation. They notice that the demonstration uses the ip. Commands rather than the traditional ifconfig. IPROUTE2 Utility Suite Howto. NarkNet ...
narknet.net
NarkNet - Passive Wi-Fi Surveillance FAQ
http://www.narknet.net/faq.html
Nark [verb] slang - to serve or behave as a spy or informer. Net [noun] a computer network. Plusmn; Where can I get a copy of the NarkNet presentation slides? You can get a copy of the NarkNet presentation slides here. On my Georgia Institute of Technology. Plusmn; Why do you use the ip and iw commands in the NarkNet presentation? When people read the NarkNet presentation. They notice that the demonstration uses the ip. Commands rather than the traditional ifconfig. IPROUTE2 Utility Suite Howto. NarkNet ...
defcongroups.org
DEF CON® Hacking Conference
https://www.defcongroups.org/dcpages.html
Skip to main content. DEF CON Hacking Conference. Is there a group near you? If you're ready to be the POC for a new group, here's the rules. There are DEF CON Groups to join all over the world. None near you? It's time to start one. The DEF CON GROUPS FAQ. Has the answers to most of the common questions you might have. Follow DEF CON on social media. Let us know what your group is up to. So take a look around you will find links and ‘home pages’ of all current global DCGs. Redmond, Washington USA. DC214...
eyeis.net
EyeIS | An Eye on Information Security | Page 2
http://eyeis.net/page/2
An Eye on Information Security. Skip to primary content. Skip to secondary content. Awareness & Education. Exploits, Patches & Vulnerabilities. Guides & Walkthroughs. Monitoring, Trends & Reports. Morning Rags & Blogs. Newer posts →. Security Onion for Splunk 1.1.3 – IDS Rule Reference. July 20, 2012. Now) JJ Cummings’ PulledPork. Just to be clear, what I’m about to describe in no way replaces what PulledPork does. It provides Splunk visibility to rule files created by PulledPork. Oinkcode required), thi...