Infosec Dojo Podcast
1) Electronic Stalking and Harassment
This is a presentation I’ve been doing at a few infosec events recently. I talk about how hackers and stalkers harass you online, and how they get into your devices, email, and social media accounts.
2) The Importance of Web Application Security
In this episode: I discuss why you should be testing your web application security, and perform periodic vulnerability scans. This one is short, and the first I’ve posted after a long break. I’ll get...Show More
3) Security in Depth is Failing
Security in Depth is Failing I’m back after fighting a cold for the past two weeks. I talk about how Security in Depth is Failing, and the reasons for that. I think this comes down to talent, training...Show More
4) Using the SHA-1Sum for File Integrity Checks
The SHA-1Sum SHA-1Sum is a Linux that calculates and verifies SHA-1 hashes. It is commonly used to verify the integrity of files. The has values should be the same as long as the file hasn’t been mod...Show More
5) The lsof and fuser command in Linux
lsof and fuser commands in Linux – Episode 2 Show Notes lsof is a command in Linux that lists open files. running lsof gives you information such as Command, PID, TID, USER, FD, TYPE, DEVICE, SIZE/OFF...Show More
6) Network Security Logging
Network Security Logging Network Security Logging is one of the basic elements you should have for your infrastructure. Proper logging of your network devices will help you build an audit trail and un...Show More