This is about … .
This is about … .
This is about … .
These are some unstructured notes about my interests and where I want to grow.
🛠 How to connect an old HP (LaserJet 1018) to MacBook?
✍️ https://support.apple.com/kb/dl907?locale=en_US. This solution only worked for older OS. Big Sur and Catalina are out.
I’ve been longing to finish Hacking the Art of Exploitation book, but I needed VM for that and this wasn’t very convenient. But recently I’ve set my EC2 AWS environment and am going to use VMs remotely. This makes it easier to finally finish the book 📚.
# compile
gcc firstprog.c
# check a.out
# ls -l a.out
# run
./a.out
objdump -D a.out | grep -A20 main.:
gcc -g firstprog.c
gcc -o char_array char_array.c
gdb -q ./firstprog.o
break main
run
info registers
https://www.geeksforgeeks.org/compile-32-bit-program-64-bit-gcc-c-c/
cert name
count
CREST
0.5
Network+
0.5
GCIA
1.5
GCIH
0.5
GCFA
1
ACE
1.5
BSc
1
CCE
1.5
A+
1
MCP
1
ACFS, BITS
1
MCFE
0.5
EnCE
1.5
PIP1
2
GCFE
0.5
CISSP (0.5), SSCP or CCSP, CISM (0.5), CISA (0.5)
1
SANS GCIA, GCIH
1
CCNA, CCIE, NGFW
1
GREM, GCFE, OSCP
1
https://www.giac.org/certification/certified-forensic-examiner-gcfe?msc=giac-focus-area
This is my GCFA study plan. I hope it will help me in organizing and prioritising the topics to learn and also in estimating the time I need to get ready. There are two plans that I’ve used: exam plan and the official course plan. On the exam description page there is stated that:
No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives’ knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.
System design is very important for any IT specialist. Software engineers are not the only ones who get frequently asked about this when interviewed in some top IT companies. Security engineers face this kind of questions as well. Here are my notes and ideas that I’ve made about system design. I had no prior knowledge whatsoever when I started learning this. I’m not even sure what kind of problems I am to expect for a security position. That’s why I’ll try to cover some courses to get the idea and try to come up with my own system design interview questions and how to answer them.
All the books and articles that I’ve read and found interesting. 📖 reading now, ✔️ - read.
Copied from LinkedIn [𝐅𝐑𝐄𝐄 𝐑𝐄𝐒𝐎𝐔𝐑𝐂𝐄𝐒 / 𝐏𝐔𝐑𝐏𝐋𝐄 𝐓𝐄𝐀𝐌]
Purple Team is born from the collaboration between Red Team and Blue Team. But what is it exactly? Check out this resources to know more about it
👉 𝗪𝗵𝗮𝘁 𝗶𝘀 𝗣𝘂𝗿𝗽𝗹𝗲 𝗧𝗲𝗮𝗺 🌟 The Difference Between Red, Blue, and Purple Teams by Daniel Miessler https://lnkd.in/ePj9PdJn 🌟 Purple Teaming for dummies by Jonathan Relber, Ben Opel and Carl Wright: https://lnkd.in/g45jnejT 🌟 ENTERPRISE PURPLE TEAMING: AN EXPLORATORY QUALITATIVE STUDY (𝒘𝒊𝒕𝒉 𝒍𝒐𝒕𝒔 𝒐𝒇 𝒓𝒆𝒔𝒐𝒖𝒓𝒄𝒆𝒔) by Xena Olsen, DSc, MBA , Ch33r10 https://lnkd.in/gnGFfPbR