by hellor00t | Dec 30, 2015 | blog, hacking, reviews
Course Overview I recently completed and was awarded my SANS GCIA Certification. The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network...
by hellor00t | Dec 26, 2015 | ctf, hacking
In an attempt to stay motivated and focus on my own individual projects while I’m not at work. I’m going to challenge myself to post more frequently in a blog-esqe style. Tutorials and technical write-ups will still come. I’m primarily using this...
by hellor00t | Dec 25, 2015 | blog
Happy Holidays everyone! I had some time to work on the site this week and decided to do some back end work. I’m hardly a website developer and to be completely frank I find website development and technologies frustrating at best. I did learn quite a few things...
by InCIDRthreat | Dec 16, 2015 | hacking, Hardware, security, technology
Basics RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time...