Thanks for giving me the opportunity to introduce myself and what I do. I started in this industry writing installation manuals and man pages for Unix systems at long forgotten parallel processing computer makers. After taking some time off to raise my family, I’m jumping back into the industry.
My mother’s online identity was compromised in an online Phishing attack. She was so naive about protecting her online life that I’m sure the hacker couldn’t believe how helpful she was in clicking random links and installing malware on her computer. I saw this as an opportunity to learn from and document her experience in my “My Mother was the Victim of an online Phishing Attack” which I just learned won second place in Twingate’s Cybersecurity Writing contest on Hackernoon!
Before moving back into Unix and Cybersecurity writing, I wrote articles for the Camera Trapping and Trail Camera community documenting how to capture wildlife on camera with high-resolution DSLR cameras and DIY sensors.
I spend a lot of time configuring computers, installing software, and making changes to my network. After each change, I document the process using Microsoft OneNote so I can remember the steps if I need to repeat the procedure or recover from mistakes. Some of these notes go on to become articles for Hackernoon or my website. Documenting my work is a daily part of my writing routine.
So many of us have Internet-connected devices and have no idea how to configure them or what it means to leave them vulnerable with default settings. I have to remember that not everyone is well-versed in technology or is comfortable making configuration settings on their router or Wi-Fi security cameras. I try to write under the assumption that not all readers are familiar with the command line, VPNs, or network terminology.
I’m studying for the CompTIA Security+ exam. Next will be the CompTIA A+ and Network+ exams. My goal is to incorporate what I learn from these courses into my writing. I’ve heard so much about the massive gap in Cybersecurity workers, I’ve decided to do my best to help the cause.
I have a home lab in my basement. I spend way too many hours surfing Craigslist, Ebay, and Facebook Marketplace looking for old servers, routers, network switches, and Lenovo laptops. All of this equipment provides a safe playground to practice ethical hacking and a practice lab environment for my CompTIA studies. This home lab allows me to configure systems, break them, and learn about technology that I wouldn’t normally have access to use.
I’ve recently picked up the exciting and rewarding hobby of Locksport. Locksport is the ethical picking of locks that you own or have permission to open. As a member of the Locksport sub-Reddit, I’m working through their belt-ranking system. Locksport is a great distraction while waiting for system backups, running Nmap scans, or watching YouTube videos.
I’m working on a behind-the-scenes (BTS) article showing how a malicious actor can gain entry to a Linux system. We hear about breaches almost daily in the news, the casual reader has no idea how a successful attack works. Using an old, patched, well-documented exploit, this article will pull back the curtain and show you how it is done.
Thanks again for giving me the opportunity to introduce myself to this awesome community. I hope to continue writing more articles on Linux and Cybersecurity for Hackernoon.