Tag Archives: OSINT


Automate your IX’s RS Config
2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark

Hackers Find Missing People For Fun
AmazingBSidescold casescomputer forensicscrimeCrowdsourcingDEFCONdigital footprintdigital footprintsdiy internetdiy ispdocumentaryfree thinkfreethinkfreethink codedfreethink diy sciencefreethink mediafreethink superhumanhackerhacker conferencehackersinnovationinspiringmissing peoplemissing personsmissing persons casesOpen Source IntelligenceOSINTRob Sellsciencesearch and rescuetechtrace labtrace labstracelabstrue crime

The Cyber Security Crusade! (The Cyber Underground)
ccdccehcertified ethical hackerCollegiate Cyber Defense Competitioncyber securityDiversificationEconomyeducationEnergyethical hackingGlobalizationHATSHawaiiHawaii Advanced Technology SocietyInformation Security and AssuranceISAKapiolani Community CollegeNational Cyber LeagueOHWOOpen Source IntelligenceOSINTpopulartechThink Tech HawaiiUniversity of Hawaii West Oahu

Using Pod Security Policies to harden your Kubernetes cluster
2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark

Scale MySQL beyond limits with ProxySQL
2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark
Recent Posts
- 2 Hour Data Analyst Interview Masterclass | Interview Better Than The Competition
- Difference between Clustered Columnstore Index Table in Azure SQL and Table in Azure Data Warehouse
- Streamlining E2E Test Automation with Azure DevOps Build/Release Pipelines by Anand #SeleniumConf 24
- Session 3: CFAIL 2020; The Evolution of IPsec (invited talk by Steven Bellovin)
- Unix & Linux: Get common name (CN) from SSL certificate? (3 Solutions!!)