Cyber Security
3 views | +0 today
Your new post is loading...
Your new post is loading...
Scooped by Matt
Scoop.it!

Watch Dogs 2 is the best hacking video game so far

Watch Dogs 2 is the best hacking video game so far | Cyber Security | Scoop.it
After the first Watch Dogs, I was surprised at how well the sequel adapts hacking for entertaining gameplay while giving a nod to the real-life scene.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Investigating external network connections with netstat

Investigating external network connections with netstat | Cyber Security | Scoop.it
When investigating a potentially compromised Windows computer, it's important to check its network connections. Here's how to make sense of netstat data.
more...
No comment yet.
Scooped by Matt
Scoop.it!

6 lessons in strategy from F1 boss Ross Brawn

6 lessons in strategy from F1 boss Ross Brawn | Cyber Security | Scoop.it
F1 technical director Ross Brawn gives his perspectives on strategy in his book - and there are more parallels with cyber security than you might think.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Raspberry Pi Home Hub: Sending a daily email briefing

Raspberry Pi Home Hub: Sending a daily email briefing | Cyber Security | Scoop.it
The next feature for my Raspberry Pi Home Hub is a Python script that will automatically send an email briefing every morning using Yagmail.
Matt's insight:
Share your insight
more...
No comment yet.
Scooped by Matt
Scoop.it!

Python for Windows Forensics: Google Chrome history

Python for Windows Forensics: Google Chrome history | Cyber Security | Scoop.it
Web browsing data can tell an analyst a lot about a user's activity. Here's how to extract a user's history from Google Chrome with a Python script.
more...
No comment yet.
Scooped by Matt
Scoop.it!

SQL ALTER TABLE: Add, modify, and drop columns

SQL ALTER TABLE: Add, modify, and drop columns | Cyber Security | Scoop.it
An explanation of the ALTER TABLE statement in SQL, which allows you to add, alter, rename, or drop columns in a SQL table.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Raspberry Pi Home Hub: Project intro and objectives

Raspberry Pi Home Hub: Project intro and objectives | Cyber Security | Scoop.it
This year I'm building a Raspberry Pi Home Hub to display useful information like news and weather on a screen small enough to sit in the corner of my desk.
more...
No comment yet.
Scooped by Matt
Scoop.it!

The streamer who wastes tech support scammers' time

The streamer who wastes tech support scammers' time | Cyber Security | Scoop.it
Tech support scams are difficult to stop - but I recently discovered a Twitch streamer working to raise awareness of the threat.
more...
No comment yet.
Scooped by Matt
Scoop.it!

The challenges and benefits of quitting Facebook

The challenges and benefits of quitting Facebook | Cyber Security | Scoop.it
leaving Facebook has helped to give me the time and focus I've needed to keep my new year's resolutions on track and become more productive in 2019.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Python for Windows Forensics: MS Office recent files

Python for Windows Forensics: MS Office recent files | Cyber Security | Scoop.it
How to use Python to find which Microsoft Office files a user has recently accessed and when, and parse the results into a CSV forensic timeline.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Agile project management framework - an introduction

Agile project management framework - an introduction | Cyber Security | Scoop.it
Agile is an inescapable part of life as a cyber security professional. Here's a brief introduction to its key priorities, players, and processes.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Raspberry Pi Home Hub: News and weather screen

Raspberry Pi Home Hub: News and weather screen | Cyber Security | Scoop.it
How to use Python to populate an HTML template with the latest BBC News headlines, Met Office weather forecasts, and Transport for London Tube updates.
more...
No comment yet.
Scooped by Matt
Scoop.it!

Python for Windows Forensics: Security event log

Python for Windows Forensics: Security event log | Cyber Security | Scoop.it
How to use Python to query the Windows Security event log to gather information on the user's logon and logoff activities with events 4624 and 4647.
more...
No comment yet.