paint-brush
Meet the Writer: Hacker Noon Contributor Scott Eggimann Talks About Tech Writing and Cybersecurityby@fatman
229 reads

Meet the Writer: Hacker Noon Contributor Scott Eggimann Talks About Tech Writing and Cybersecurity

by Scott EggimannSeptember 1st, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Scott Eggimann is a contributing writer for Hackernoon. He started writing installation manuals and man pages for Unix systems at long forgotten parallel processing computer makers. After taking some time off to raise his family, he’s jumping back into the industry. Documenting my work is a daily part of my writing routine. I spend way too many hours surfing Craigslist, Ebay, and Facebook Marketplace looking for old servers, routers, network switches, and Lenovo laptops. Locksport is ethical picking of locks that you own or have permission to open.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Meet the Writer: Hacker Noon Contributor Scott Eggimann Talks About Tech Writing and Cybersecurity
Scott Eggimann HackerNoon profile picture


So let’s start! Tell us a bit about yourself. For example, name, profession, and personal interests.

Thanks for giving me the opportunity to introduce myself and what I do. I started in this industry writing installation manuals and man pages for Unix systems at long forgotten parallel processing computer makers. After taking some time off to raise my family, I’m jumping back into the industry.

Interesting! What was your latest Hackernoon Top story about?

My mother’s online identity was compromised in an online Phishing attack. She was so naive about protecting her online life that I’m sure the hacker couldn’t believe how helpful she was in clicking random links and installing malware on her computer. I saw this as an opportunity to learn from and document her experience in my “My Mother was the Victim of an online Phishing Attack” which I just learned won second place in Twingate’s Cybersecurity Writing contest on Hackernoon!


Do you usually write on similar topics? If not, what do you usually write about?

Before moving back into Unix and Cybersecurity writing, I wrote articles for the Camera Trapping and Trail Camera community documenting how to capture wildlife on camera with high-resolution DSLR cameras and DIY sensors.


Great! What is your usual writing routine like (if you have one?)

I spend a lot of time configuring computers, installing software, and making changes to my network. After each change, I document the process using Microsoft OneNote so I can remember the steps if I need to repeat the procedure or recover from mistakes. Some of these notes go on to become articles for Hackernoon or my website. Documenting my work is a daily part of my writing routine.


Being a writer in tech can be a challenge. It’s not often our main role, but an addition to another one. What is the biggest challenge you have when it comes to writing?

So many of us have Internet-connected devices and have no idea how to configure them or what it means to leave them vulnerable with default settings. I have to remember that not everyone is well-versed in technology or is comfortable making configuration settings on their router or Wi-Fi security cameras. I try to write under the assumption that not all readers are familiar with the command line, VPNs, or network terminology.


What is the next thing you hope to achieve in your career?

I’m studying for the CompTIA Security+ exam. Next will be the CompTIA A+ and Network+ exams. My goal is to incorporate what I learn from these courses into my writing. I’ve heard so much about the massive gap in Cybersecurity workers, I’ve decided to do my best to help the cause.


Wow, that’s admirable. Now, something more casual: What is your guilty pleasure of choice?

I have a home lab in my basement. I spend way too many hours surfing Craigslist, Ebay, and Facebook Marketplace looking for old servers, routers, network switches, and Lenovo laptops. All of this equipment provides a safe playground to practice ethical hacking and a practice lab environment for my CompTIA studies. This home lab allows me to configure systems, break them, and learn about technology that I wouldn’t normally have access to use.

The Home Lab



Do you have a non-tech-related hobby? If yes, what is it?

I’ve recently picked up the exciting and rewarding hobby of Locksport. Locksport is the ethical picking of locks that you own or have permission to open. As a member of the Locksport sub-Reddit, I’m working through their belt-ranking system. Locksport is a great distraction while waiting for system backups, running Nmap scans, or watching YouTube videos.


What can the Hacker Noon community expect to read from you next?

I’m working on a behind-the-scenes (BTS) article showing how a malicious actor can gain entry to a Linux system. We hear about breaches almost daily in the news, the casual reader has no idea how a successful attack works. Using an old, patched, well-documented exploit, this article will pull back the curtain and show you how it is done.


Thanks for taking the time to join our “Meet the writer” series. It was a pleasure. Do you have any closing words?

Thanks again for giving me the opportunity to introduce myself to this awesome community. I hope to continue writing more articles on Linux and Cybersecurity for Hackernoon.