Your cart is currently empty!
Blog
-
Published Date
Modified Date
MD5 Password Cracking with John the Ripper
In this article, I will demonstrate the cracking of MD5 salted passwords using Kali Linux and a password cracking tool, John the Ripper. To put this into context, some older… Read more
-
Published Date
Modified Date
Three Mobile Telephone Call Scam Exposed
Change Log Date Change 23/04/2024 Added an update to include a response from the telephony provider. Today, I have managed to expose another scam targeting people throughout the United Kingdom.… Read more
-
Published Date
Modified Date
Why I Turned Down a £300,000 Job Opportunity
In the ever-evolving landscape of employment, opportunities often come knocking at our door when we least expect them. Recently, I found myself faced with a tempting opportunity that landed in… Read more
-
Published Date
Modified Date
O2 Discount Offer Vishing Scam Exposed
Change Log Update Date Updates on the outcome of reporting this scam. 05/04/2024 Added a copy of my email sent to Nextec UK Limited 09/04/2024 Coming in hot with another… Read more
-
Published Date
Modified Date
Graylog vs Wazuh Syslog Output Observations
Recently I’ve been working with Wazuh to forward syslog from network devices using Rsyslog. Usually, I would send syslog to a dedicated SIEM but I wanted to test the out-of-the-box… Read more
-
Published Date
Modified Date
Configure Rsyslog for Logging to Wazuh
In this article, we will take a look at how to configure a Linux server with Rsyslog so that we can receive syslog events from network devices before sending them… Read more
-
Published Date
Modified Date
Talk to the Dead with AI
The use of Artificial Intelligence (AI) has greatly increased in the past year and is expected to keep growing. AI is being used for various things like chatbots and creating… Read more
-
Published Date
Modified Date
How to Capture the DNS Query Count from a Windows Server
In this article we will take a look at how to capture the number of DNS queries that a Windows server receives. Prerequisites Steps To get the best results, I… Read more
-
Published Date
Modified Date
How to Determine the Number of Cisco Umbrella Seats Required
Change Log Change Date Added a new section ‘Calculating SIG Usage’ 18/03/24 One thing that I find is often overlooked, misunderstood or not really understood from the very start is… Read more
Follow me
Popular Tags
#LabEveryday 2FA asa asav Azure ccie ccie security CCNA ccna security CCNP CCNP Security Cisco cisco asa Cisco Duo cisco firepower Cisco Identity Services Engine Cisco ISE Cisco Labs Cisco Secure cisco umbrella CISSP Cyber Security Cybersecurity Duo Duo MFA Duo Security Duo Single Sign-on Duo SSO FirePOWER FMC FTD Identity Services Engine ISC2 ISE Labs microsoft Network Security network wiizkiids network wizkid phishing PKI Security security vmware VPN
Subscribe
Stay updated with our latest articles by joining our newsletter.
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- October 2020
- September 2020
- July 2020
- June 2020
- April 2020
- March 2020
- February 2020
- January 2020
- November 2019
- September 2019
- August 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- September 2018
- August 2018
- July 2018
- May 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- June 2017
- March 2017
- February 2017
- January 2017
- December 2016
- August 2016
- August 2015
- April 2015