On 4/17/16, I will be giving a presentation on the WordPress backups, updates and security. This presentation provides a basic, high level approach to keeping a WordPress site secure.
This presentation will be given at WordCamp Jacksonville 2016.
Cyber Security Vulnerabilty Management
On 4/17/16, I will be giving a presentation on the WordPress backups, updates and security. This presentation provides a basic, high level approach to keeping a WordPress site secure.
This presentation will be given at WordCamp Jacksonville 2016.
If you loaded your Raspberry Pi using the Raspbian operating system, chances are you may still be using the default user id “pi” with the password “raspberry”. This is a quick tutorial to show you how to change that. Continue reading “Change Password on Raspberry Pi”
I have been evaluating the idea of spinning up a Digital Ocean VM for my web hosting as a cost effective alternative to shared web hosting. Digital Ocean requires you to know how to understand operating systems, I just happen to be the right guy for the job. I wanted to field test my future setup on my Raspberry Pi to get an idea of how much time it is going to take and what I can do to tune it for maximum performance. All of my sites have been converted to WordPress, my desire was to build a LEMP (Linux Engine-X, MySQL and PHP) stack to accommodate this setup. Continue reading “Install WordPress and NGINX on Raspberry Pi”
Today, one of the Desk Community members came up with this topic:
What hobbies and/or talents did you take up between childhood and high school and how did they guide or not guide you into your current career choices and hobbies done in your free time now? Continue reading “How Childhood Hobbies Influenced my Career Choice”
I feel a bit overwhelmed as of late. We are working on putting the house up for sale, we just passed into mid-terms at school and I’ve been moving web hosts. In hindsight, I should have put off the web host move for a few months, although I do not regret moving my sites. Continue reading “Juggling Too Much”
As we reach the beginning of the new year, we get excited about the prospect of changing our lives to do something better. This requires changing replacing old habits with new ones. Continue reading “Habits”
US Army has released a network forensic analysis tool to Github to garner more support to expand the usefulness of the tool. DShell is a open source tool written in Python that aids in network forensic analysis for compromised environments.
Following and reassembling a stream of sample traffic.
I was fortunate to hear Todd Cohen, the author of “Everyone’s in Sales” speak at the Premier CIO Forums this past week in Orlando. The forums were put on by the Society of Information Management. Todd left me with some things to consider which feel life changing and empowering in my professional life. Continue reading “Everyone is in Sales”
I came across this epic cartoon over at xkcd regarding the strength of passwords. The conventional line of thought is a minimum of 8 characters with a mixture of caps and special characters.
As computing power increases, passwords that are or a certain length are trivial to crack, assuming the right conditions are present.
Since not all systems are designed the same on the internet. A basic defense is to use a different password on every site that you have an account on. Without going into too many gory details, many websites do not follow best practices in how they store passwords. There are sites on the internet that store passwords in a database in plain human readable text. There are sites out there that do not lock users out after a certain amount of attempts, which paves the road for a never ending brute force attempt.
Since I have moved into my new position at work, I have been dressing up a bit more than I used to be. As someone pointed out, that I’m no longer dressing up like an IT ruffian like I used to. I wear dress shirts and pants to work in place of faded polo shirts and dockers. Continue reading “Bow Ties”