I Smell Packets


Scratch Pad

 

Google Drive

 


 

Example of a Conceptual Design Diagram

 

 

 

 

 

 

 

 

 

 

 


 

 

Example of a Logical Design Diagram

 

 

 


 

 

Example of a Physical Design Diagram

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

 

Spectre (security vulnerability)

Meltdown (security vulnerability)

The Basics of Arpspoofing/Arppoisoning

Z-Wave

Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2018

Hak5 Gear

The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps

The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

Hash Crack: Password Cracking Manual (v2.0) 2nd Edition

Pipal, Password Analyser

Center for Internet Security

USENIX Enigma 2016 – NSA TAO Chief on Disrupting Nation State Hackers

Google Hacking Database (GHDB)

Metasploitable 2

WiGLE.net

SANS Internet Storm Center

Kryptos

spammimic

Lover Letter.jpg

A (relatively easy to understand) primer on elliptic curve cryptography

AES Rijndael Cipher – Visualization

Enigma

live.sysinternals.com

NETMARKETSHARE Operating System Share by Version

NETMARKETSHARE Operating System Market Share

CENTRIFY EXPRESS

Distrowatch.com

A Sysadmin’s Unixersal Translator (ROSETTA STONE)

The Command Line Rosetta Stone

VIM Adventures

Mastering Regular Expressions Third Edition

Privacy Rights Clearinghouse

Common Vulnerabilities and Exposures

National Vulnerability Database

Kali

Malware Domain List

EUROPEAN EXPERT GROUP FOR IT-SECURITY

WICAR.org

VirusTotal

Get Credit Card Numbers

FAKE NAME GENERATOR

APT1: Exposing One of China’s Cyber Espionage Units

The Security Flag in the IPv4 Header

Kali Linux in the Windows App Store

Run ‘Kali Linux’ Natively On Windows 10 — Just Like That!

GitHub – DShield-ISC/dshield: DShield Raspberry Pi Sensor

4 Free Online Tools for Examining Suspicious PDFs

‘;–have i been pwned?

Advertisements







%d bloggers like this: