SECTION 9 Cyber Security

SECTION 9 Cyber Security


Information Security is the name of the game. Don't let the hackers win!

Looking for recently uploaded episodes
#77 LastPass, Yubikey, & Two Factor Authentication

0:00 | Aug 27th, 2018

We are slowly moving forward with LastPass, the Yubikey, and two factor authentication. Dorothy forgot her master password for LastPass. This lead us down the path of account recovery, which we quickly realized wasn't an option. What do we do if we f...Show More

#76 Basic Linux Server Administration

0:00 | Aug 20th, 2018

Once Dorothy's network is up and running, she will have to take on the role of Linux administrator. We talk about basic Linux server administration. This includes basic commands and baselines for services and log files. This is a big step for Dorothy...Show More

#75 IP Addressing & Network Design

0:00 | Aug 13th, 2018

Dorothy and I talk about IP Addresses for her new network. There are several things we have to take into consideration. The number one issue is overlapping IP space. We can't have that. We also have to plan for the future. How many subnets will she n...Show More

#74 Synology, Palo Alto, Yubikey, & Network Design

0:00 | Aug 6th, 2018

We're getting ready to move our network to Dorothy's new computer room. This will be a lot of work. We talk about the equipment, some planning and things we need to work on.  LIST OF EQUIPMENT 1. Palo Alto PA-220 Firewall 2. 3 Cisco 8 port 3560 swi...Show More

#73 The Level One Robotics Data Breach

0:00 | Jul 30th, 2018

In this episode we talk about the Level One Robotics Data Breach. They have several big clients including Ford, Tesla, GM and Toyota. Data belonging to Level One Robotics and their clients was left on a server connected to the Internet. Anyone could ...Show More

#72 DNS With BIND9

0:00 | Jul 23rd, 2018

We managed to get DNS setup using BIND9 on our Raspberry Pi data center. We go over what we did, how we did it, and what we learned. This was a little tricky because BIND has several config files. We also had to reconfigure the DHCP server so Dorothy...Show More

#71 DHCP Failover and Security

0:00 | Jul 16th, 2018

Our DHCP failover system is up and running. It's pretty cool seeing this in action. We talk about what we did and how we got it to work. We also talk about how this applies to security.

#70 DHCP Failover With NTP

0:00 | Jul 9th, 2018

In this episode Dorothy and I try to understand the ISC DHCP server fail over configuration. There are two servers, primary and secondary. The servers work in a load balancing configuration by splitting the subnet in half. We understand that part. Th...Show More

#69 Setting Up A DHCP Server On Linux

0:00 | Jul 2nd, 2018

In this episode we talk about setting up a DHCP server on Linux. We go through the process of installing the software, configuring the service, and analyzing how DHCP works. We also talk about how some of this applies to security. We learned a lot fr...Show More

#68 Security Doesn't Need to be Rocket Science

0:00 | Jun 25th, 2018

A lot of security experts talk about threat hunting, packet analysis and pen testing. Can you do effective threat hunting? Are you able to analyze packets and spot the bad guy? For most people in IT, the answer to these questions is a big fat no. We'...Show More

#67 Ubuntu 18.04 & Other Projects

0:00 | Jun 18th, 2018

In this episode Dorothy tests Ubuntu 18.04 Bionic Beaver. I go over some of the projects I'm working on. We decided to test Ubuntu 18.04 to see if Dorothy can use it, or would she need some training. We did the install in a VM using VirtualBox. A few...Show More

#66 IT & The Human Behind it

0:00 | Jun 11th, 2018

For this episode, Dorothy decided to ask me how I got into IT. We also talk about why we focus on processes, check lists and disaster recovery plans. We finish with things that might help others get into IT. Things like building a home lab and watchi...Show More