Blog Archives

Did you know Experian was recently hacked?

Experian Hacked

When you walk into a T-Mobile store or apply for a cellular plan online or over the phone, T-Mobile runs a credit check on to make sure you’re good for repayment.  But here’s the big news: if you applied between

Posted in News Tagged with: ,

Crypto 201: Public Key Infrastructure (PKI) – Cryptography for smarties (Part 1 of 3)

PKI with Vonnie, background image credit J. Triepke via Flickr

Cybersecurity gurus sometimes stumble over what SSL, HTTPS, TLS have in common.  Do you know the answer?  If you said the “S” then I’ll give you a gold star for being a smartie pants – but that’s not what I have in

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Welcome to Kali Linux (Part 3 of 3)

Image credit Tobi Firestone via Flickr

In the first guide, I gave you an overview of Kali Linux.  Then in the previous guide I showed you how to setup Kali Linux in VirtualBox.  In this guide, we’re going to log in Kali Linux, update the packages

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 2 of 3)

Image Credit Sparkle Motion via Flickr

In the last guide, I gave you a sweeping overview of the powerful digital forensic toolset known as Kali Linux.  In this guide, I’m going to show you how to install Kali Linux in VirtualBox so you can have a test

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 1 of 3)

Image credit Adhi Rachdian via Flickr

What’s your favorite hacker movie? Is it Iain Softley’s 1995 classic Hackers?  Or what about War Games or maybe you couldn’t get enough of Bruce Willis in Live Free or Die Hard? All these movies are great right?  They all tell

Posted in Linux, Security Tagged with: , , , , , , ,

Last updated by at .