This is the general page for posts detailing articles related to computers, software, or technology in general.
Best Practices
- Regulatory, compliance, & security frameworks
- Tips to safeguard your digital secrets
- Managing your passwords
- Standards and organizational controls (SOC)
- Indicators of compromise (IOC)
- Generic outline for writing a policy or procedure
General
- TCP/IP stack using the OSI model
- Private IP address ranges
- Job duties of a cyber security analyst
- Creating a report for senior managers
- Blog image sizing guidelines
Linux
- Add a personal package archive (PPA)
- Backup files to a remote server using BASH
- Manage users & groups
- Keeping your system up to date
- How to copy files to an S3 bucket using AWS CLI tools
- Sync the clock date & time
- Analyze network traffic using TCPDump
- Customize the VIM text editor
- Check system details, files, & processes
- Understanding user crontabs
- Creating & Using SSH Keys
- Back up files to an Amazon S3 bucket using BASH
Software
- Set up PUTTY with cool options
- Run Ad-Hoc commands in Ansible
- Validate the integrity of a file backup using Ansible
- Update, reboot, get health of remote servers using Ansible
- Manage user accounts with Ansible
- Run a basic NMAP scan
- Export a KeepPass master key file
- Change font size in KeePass
- Set up a SFTP server
Windows
- Introduction to robocopy
- Tracking communication with netstat & TCPView
- Run a script using Windows task scheduler
- Split text data into columns using Microsoft excel
- Change the command line start path
- Start encrypting files in Windows
- Top Windows Terminal commands
- Map local and network drives using a batch script
- Ping multiple hosts using a PS script
- Test your DNS proxy using a PS script