top of page
“In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms."
Search


Data is radioactive
Data is, like, literally radioactive. I was going to comment on the distortion and misuse of the word “literally” and comment that its...
Nov 29, 20206 min read


Fiat LAMP!
I have a confession to make... While I have worked in the Information Technology (IT) field for over twenty years, I am not a web...
Nov 22, 20204 min read


Know the rules before you break them
“It ain't what you don't know that gets you into trouble. It's what you know for sure that just ain't so.” Often attributed to Mark...
Nov 15, 20205 min read


InfoSec Basics - Multi-factor Authentication
Multi-factor Authentication, or “MFA”, ( https://en.wikipedia.org/wiki/Multi-factor_authentication ) can be quite confusing, but I think...
Nov 8, 20206 min read


Interesting times...
Like most people, I have some pretty strong opinions, but my goal with this blog was to keep it primarily professional, so I keep many of...
Nov 1, 20204 min read


InfoSec Basics - What is Cryptography?
Cryptography makes the world go ‘round. With apologies to Broadway ( https://en.wikipedia.org/wiki/Love_Makes_the_World_Go_%27Round_%28...
Oct 25, 20205 min read


InfoSec Bullshido – Zero-day
“Zero-day” ( https://en.wikipedia.org/wiki/Zero-day_%28computing%29 ) or “0-day” (also pronounced “oh-day”), is another term that we hear...
Oct 18, 20206 min read


InfoSec Bullshido – Dark Web
When considering the term “dark web”, I had trouble deciding whether to post under InfoSec Basics or InfoSec Bullshido. On the one hand,...
Oct 11, 20207 min read


NASty Deeds
First, a bit of an “oopsie”. As mentioned previously in my “series” on setting up my network ( https://www.til-technology.com/my-blog/ca...
Oct 4, 20204 min read


InfoSec Basics – Credential Stuffing
Now that we know a bit about hashing ( https://www.til-technology.com/post/infosec-basics-hashing ) and passwords (...
Sep 27, 20208 min read


Attack of the Process Zombies
A young woman – let’s call her Alice – had recently moved into her own apartment, and invited her parents over for Thanksgiving dinner...
Sep 20, 20205 min read


NASty Thoughts
Backups are important. This is one of the fundamental truths of Computer Science. Carving things in stone is a reasonably durable...
Sep 13, 20204 min read
bottom of page