Tumgik
#introduction to cybersecurity
reallytoosublime · 10 months
Text
youtube
Cybersecurity is the practice of protecting computer systems, networks, data, and digital information from various threats and attacks, with the goal of ensuring the confidentiality, integrity, and availability of these resources. In today's highly interconnected and digital world, cybersecurity plays a crucial role in safeguarding sensitive information and maintaining the functionality of critical infrastructure.
In the digital landscape, various entities, including individuals, businesses, governments, and organizations, face an array of cyber threats such as hacking, malware, phishing, ransomware, and data breaches. These threats can lead to financial losses, privacy violations, disruption of services, and even compromise national security.
To counter these threats, cybersecurity employs a multifaceted approach that involves technical solutions, policies, and human behavior. It encompasses a variety of disciplines, including information security, network security, application security, and more.
The importance of cybersecurity has grown exponentially with the increasing reliance on technology for personal, business, and government operations. As more and more sensitive data is stored, transmitted, and processed electronically, the risks associated with cyber threats have become more sophisticated and diverse.
Protecting yourself from online security threats is crucial in today's digital age, where cyberattacks and data breaches have become commonplace. Implementing effective security measures can help safeguard your personal information, financial data, and overall online presence.
By taking some comprehensive steps to protect your online security, you can significantly reduce the risk of falling victim to cyberattacks, data breaches, and other online threats. While no security measure is foolproof, a combination of awareness, vigilance, and proactive precautions can greatly enhance your online safety.
Escaping The Dangers: Ensuring Your Online Security
0 notes
youtubemarketing1234 · 10 months
Text
youtube
Cybersecurity is the practice of protecting computer systems, networks, data, and digital information from various threats and attacks, with the goal of ensuring the confidentiality, integrity, and availability of these resources. In today's highly interconnected and digital world, cybersecurity plays a crucial role in safeguarding sensitive information and maintaining the functionality of critical infrastructure.
In the digital landscape, various entities, including individuals, businesses, governments, and organizations, face an array of cyber threats such as hacking, malware, phishing, ransomware, and data breaches. These threats can lead to financial losses, privacy violations, disruption of services, and even compromise national security.
To counter these threats, cybersecurity employs a multifaceted approach that involves technical solutions, policies, and human behavior. It encompasses a variety of disciplines, including information security, network security, application security, and more.
The importance of cybersecurity has grown exponentially with the increasing reliance on technology for personal, business, and government operations. As more and more sensitive data is stored, transmitted, and processed electronically, the risks associated with cyber threats have become more sophisticated and diverse.
Protecting yourself from online security threats is crucial in today's digital age, where cyberattacks and data breaches have become commonplace. Implementing effective security measures can help safeguard your personal information, financial data, and overall online presence.
Escaping The Dangers: Ensuring Your Online Security
0 notes
geckos-and-stuff · 1 year
Text
I'm new here. I don't know how to use this app so I'll just introduce myself and post a picture of a gecko. I'm a tech nerd who uses the best distro Arch linux and likes security related topics. I also like exotic animals. I keep few reptiles, Mantises and tarantulas. In spare time I do diy stuff and play mmorpg
Tumblr media
60 notes · View notes
themilksnake · 11 months
Text
pinned intro
(*^^*)♡
Tumblr media
I'm Sonii/Rian, either one is good! ☆
they/any pronouns
I'm an internet art angel ʚ₍ᐢ. .ᐢ₎ɞ with bendy joints and a broken hand. Despite it all, my passion projects live on!
original work/art tag
YouTube Bluesky Mastodon TikTok Twitch VGen
more below...
I'm nonbinary and have a complex relationship with gendered expressions. Most terms are okay with me, but almost none of them are truly correct. If you're confused, ask. I don't bite...
I'm currently a cybersecurity and compsci student! I'm also dabbling in game dev and music production. Needless to say, I like playing on computers ૮ ˶ᵔ ᵕ ᵔ˶ ა...
I have joint hypermobility and suspected hEDS (hypermobile Ehlers-Danlos Syndrome), which makes daily living a bit tragic and painful. I used to draw a lot, but I've started broadening my creative outlets to help protect my joints.
I make content about accessibility in games, specifically in regards to navigating chronic joint pain while gaming. Gaming should be for everybody!
Hobbies + Interests include:
Making game music in FL Studio Trying to teach myself Godot 4............. Collaborative character writing Pixel art + low res art Rhythm games (ouch. this is my guilty pleasure) Playing FFXIV Frutiger Aero aesthetic Houseki no Kuni Goals: Finish some small games in Godot Fully code Neocities site Finish my first sprite sheet Get a wheelchair Write and release an LP on Bandcamp
Sonii OUT. If you wanna chat or become mutuals, HMU!!
3 notes · View notes
newcodesociety · 4 days
Text
0 notes
Text
Openscap: Open Source Vulnerability and Compliance Scanner
Openscap: Open Source Vulnerability and Compliance Scanner @vexpert #vmwarecommunities #100daysofhomelab #homelab #OpenSCAPintroduction #OpenSCAPscannerinstallation #SecurityContentAutomationProtocol #Linuxsecurity
Open-source security tools are not only cost-effective, they are also very powerful. OpenSCAP is a robust line of defense in achieving and maintaining system security compliance. It delivers many features, including for the community and enterprise businesses. Table of contentsWhat is OpenSCAP?Diving Deeper into the SCAP Security GuideCustomizing OpenSCAP with Your Own Content FilesOpenSCAP…
Tumblr media
View On WordPress
0 notes
currentinfo · 2 years
Text
The Importance of Digital Trust | Building and Maintaining Confidence in the Digital World
The Importance of Digital Trust | Building and Maintaining Confidence in the Digital World
Introduction to Digital trust Digital trust is the level of confidence that individuals and organizations have in the security, privacy, and reliability of digital systems and technologies. It is an increasingly important aspect of our digital lives as we rely more and more on technology for communication, commerce, and personal information management. What is Digital Trust? Digital trust refers…
View On WordPress
0 notes
theprofessormcg · 3 months
Text
Turns out there are Linux people on tumblr. I need distro opinions.
I’m interested in programming, cybersecurity, FOSS, and generally all that nerd shit. I want to switch to Linux soonish (from Windows at home with a good amount of Mac knowledge from school), but I’m not sure what distro to pick. I’ve been using Kali in a VM on and off for a month or three now, and I’m pretty used to it. I’ve also used Arch in a VM, which was a steep learning curve (especially as my first Linux introduction), but it was otherwise pretty good. I’m leaning towards using Arch because the wiki and AUR are great and I have a friend who can help if necessary, but I wanted to get the opinion of some random strangers first. I would still use Kali in a VM or dualbooted (maybe triple booted with windows) for cybersecurity stuff, no matter the distro that I eventually decide on. Feel free to give me your thoughts and opinions or just vote:
@debian-official @kali-official (both totally unbiased)
@distrochooser
Also @beastofthebog @a-homiesexual-book-boi, you two can’t really help here, but I’m adding you anyway.
252 notes · View notes
butchgtow · 8 months
Text
Introduction to Armchair Activism
Current feelings about the state of radblr.
Fundamentals
"Yes, Everyone on the Internet Is a Loser." Luke Smith. Sep 3, 2022. YouTube.
An activist movement can be a place to build community with like-minded people, but action is its foremost purpose, not community. To allow yourself and other activists to remain effective, you are obliged to abandon your personal dislikes of other individual activists. Disagreements are worth discussion, but interpersonal toxicity is not.
Connect with in-person community and do not unhealthily over-prioritize online community. Over-prioritization of online community is self-harm.
Luke is a loser, but his channel is teeming with entry-level digital literacy information and advice pertaining to healthy use of technology for us cyborgs.
"Surveillance Self-Defense: Tips, Tools and How-Tos For Safer Online Communication." Electronic Frontier Foundation.
Hackblossom, outdated, is discontinued. The EFF project Surveillance Self-Defense is up-to-date, comprehensive, and follows personal educational principles of simplicity and concision.
To learn more about general (not focused solely on personal action) cybersecurity, visit Cybersecurity by Codecademy and Cyber Security Tutorial by W3Schools. Both contain further segueways into other important digital literacies.
Direct recommendation: Install and set up the linux distribution Tails on a cheap flash drive.
Direct recommendation: Develop your own home network security schema.
Direct recommendation: Always enable 2FA security for Tumblr, disable active / inactive status sharing, and learn to queue reblogs and posts to protect against others' interpretations of your time zone.
Direct recommendation: It's both possible and relatively simple to host your own instance of a search engine using SearXNG.
Zero-Knowledge Architecture.
As a remote activist (even if also a hybrid activist), none of your action should be taken on, using, or interfacing with non-zero-knowledge-architecture services. Tumblr is, of course, a risk in and of itself, but you should not be using services provided by companies such as Google, Microsoft, or any others based in or with servers hosted in 13-eyes agreement nations.
Search for services (email, word processor, cloud storage) which emphasize zero-knowledge architecture. Businesses whose services are structured as such cannot hand over your data and information, as they cannot access it in the first place. If they cannot access the majority of your metadata, either - all the better.
Communications for Armchair Activism
"Technical Writing." Google.
Contained within the linked page at Google Developers, the self-paced, online, pre-class material for courses Technical Writing One, Technical Writing Two, and Tech Writing for Accessibility teach activists to communicate technical concepts in plain English.
"Plain Language." U.S. General Services Administration.
Plain language is strictly defined by U.S. government agencies, which are required to communicate in it for simplicity and quick, thorough comprehension of information.
"Explore Business Law." Study.com.
Extensive courses are offered to quickly uptake principles of business law such as antitrust law, contract law, financial legislation, copyright law, etc. Legal literacy is often the difference between unethical action of a business and its inaction. Legal literacy is also often the difference between consideration and investment in your policy idea and lack thereof.
"Business Communication." Study.com.
Now that you're able to communicate your prioritized information, you may also initiate writing with bells and whistles. While other activists care most about the information itself, business communication allows you to communicate your ideas and needs to those who you must convince worthiness of investment to and win over.
Logic.
Learn it through and through. Start with fallacies if you're better at language and work your way backwards to discrete mathematics; start with discrete mathematics if you're better at maths and work your way forwards to fallacies, critical literacy, and media literacy. State that which you intend to state. Recognize empiricism and rationalism for what they are. Congratulations: you are both a mathematician and a law student.
Economic Literacy for Armchair Activism
"Microeconomics." Khan Academy.
"Macroeconomics." Khan Academy.
The globe operates on profitability. Women's unpaid labor is a massive slice of the profitability pie. While it's possible to enact change without understanding all that drives the events around you, it's impossible to direct or meaningfully manipulate the events around you beyond your scope of comprehension.
Understand economics or be a sheep to every movement you're active in and to every storm that rolls your way.
71 notes · View notes
cyberstudious · 2 months
Text
Tumblr media
An Introduction to Cybersecurity
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
What is cybersecurity?
Cybersecurity is all about securing technology and processes - making sure that the software, hardware, and networks that run the world do exactly what they need to do and can't be abused by bad actors.
The CIA triad is a concept used to explain the three goals of cybersecurity. The pieces are:
Confidentiality: ensuring that information is kept secret, so it can only be viewed by the people who are allowed to do so. This involves encrypting data, requiring authentication before viewing data, and more.
Integrity: ensuring that information is trustworthy and cannot be tampered with. For example, this involves making sure that no one changes the contents of the file you're trying to download or intercepts your text messages.
Availability: ensuring that the services you need are there when you need them. Blocking every single person from accessing a piece of valuable information would be secure, but completely unusable, so we have to think about availability. This can also mean blocking DDoS attacks or fixing flaws in software that cause crashes or service issues.
What are some specializations within cybersecurity? What do cybersecurity professionals do?
incident response
digital forensics (often combined with incident response in the acronym DFIR)
reverse engineering
cryptography
governance/compliance/risk management
penetration testing/ethical hacking
vulnerability research/bug bounty
threat intelligence
cloud security
industrial/IoT security, often called Operational Technology (OT)
security engineering/writing code for cybersecurity tools (this is what I do!)
and more!
Where do cybersecurity professionals work?
I view the industry in three big chunks: vendors, everyday companies (for lack of a better term), and government. It's more complicated than that, but it helps.
Vendors make and sell security tools or services to other companies. Some examples are Crowdstrike, Cisco, Microsoft, Palo Alto, EY, etc. Vendors can be giant multinational corporations or small startups. Security tools can include software and hardware, while services can include consulting, technical support, or incident response or digital forensics services. Some companies are Managed Security Service Providers (MSSPs), which means that they serve as the security team for many other (often small) businesses.
Everyday companies include everyone from giant companies like Coca-Cola to the mom and pop shop down the street. Every company is a tech company now, and someone has to be in charge of securing things. Some businesses will have their own internal security teams that respond to incidents. Many companies buy tools provided by vendors like the ones above, and someone has to manage them. Small companies with small tech departments might dump all cybersecurity responsibilities on the IT team (or outsource things to a MSSP), or larger ones may have a dedicated security staff.
Government cybersecurity work can involve a lot of things, from securing the local water supply to working for the big three letter agencies. In the U.S. at least, there are also a lot of government contractors, who are their own individual companies but the vast majority of what they do is for the government. MITRE is one example, and the federal research labs and some university-affiliated labs are an extension of this. Government work and military contractor work are where geopolitics and ethics come into play most clearly, so just… be mindful.
What do academics in cybersecurity research?
A wide variety of things! You can get a good idea by browsing the papers from the ACM's Computer and Communications Security Conference. Some of the big research areas that I'm aware of are:
cryptography & post-quantum cryptography
machine learning model security & alignment
formal proofs of a program & programming language security
security & privacy
security of network protocols
vulnerability research & developing new attack vectors
Cybersecurity seems niche at first, but it actually covers a huge range of topics all across technology and policy. It's vital to running the world today, and I'm obviously biased but I think it's a fascinating topic to learn about. I'll be posting a new cybersecurity masterpost each day this week as a part of the #StudyblrMasterpostJam, so keep an eye out for tomorrow's post! In the meantime, check out the tag and see what other folks are posting about :D
36 notes · View notes
msrlunatj · 1 month
Text
¿Qué Distribución de Linux Deberías Usar Según tus Intereses? / Which Linux Distribution Should You Use Based on Your Interests?
Introducción / Introduction
Español: Linux ofrece una vasta gama de distribuciones, cada una diseñada para diferentes intereses y necesidades. Ya sea que te enfoques en el desarrollo de software, la administración de sistemas, la creación de contenido multimedia, o simplemente busques una alternativa a Windows o macOS, hay una distribución de Linux que se adapta a ti. Además, Linux proporciona ventajas significativas sobre otros sistemas operativos en muchos de estos escenarios. En este blog, exploraremos cuál distribución es ideal según tus intereses y las razones por las que Linux puede ser una mejor opción en comparación con Windows o macOS. Presentaremos esta información de manera accesible para tanto hispanohablantes como angloparlantes.
English: Linux offers a wide range of distributions, each designed for different interests and needs. Whether you focus on software development, system administration, multimedia creation, or simply seek an alternative to Windows or macOS, there’s a Linux distribution that suits you. Additionally, Linux offers significant advantages over other operating systems in many of these scenarios. In this blog, we’ll explore which distribution is ideal based on your interests and why Linux might be a better choice compared to Windows or macOS. This information will be presented in a way that is accessible to both Spanish and English speakers.
1. Ubuntu: Ideal para Principiantes, Desarrollo y Diseño Gráfico / Ubuntu: Ideal for Beginners, Development, and Graphic Design
Español: Ubuntu es la elección perfecta para quienes son nuevos en Linux o buscan una distribución estable y fácil de usar para el desarrollo de software. Su amplia compatibilidad con aplicaciones como GIMP, Inkscape y Blender también la convierte en una excelente opción para diseñadores gráficos e ilustradores. Además, Ubuntu ofrece soporte para una variedad de herramientas de desarrollo, lo que la hace ideal para programadores.
English: Ubuntu is the perfect choice for those new to Linux or looking for a stable and user-friendly distribution for software development. Its broad compatibility with applications like GIMP, Inkscape, and Blender also makes it an excellent choice for graphic designers and illustrators. Additionally, Ubuntu offers support for a variety of development tools, making it ideal for programmers.
2. Fedora: Para Desarrolladores, Seguridad y Creación de Contenido Multimedia / Fedora: For Developers, Security, and Multimedia Creation
Español: Fedora se destaca por estar a la vanguardia en términos de tecnología y seguridad. Es una distribución ideal para desarrolladores y aquellos interesados en seguridad informática. Además, Fedora es compatible con una amplia gama de software para edición de video, audio y animación, como Kdenlive, Audacity y Blender, lo que la convierte en una opción sólida para creadores de contenido multimedia.
English: Fedora stands out for being at the forefront of technology and security. It’s an ideal distribution for developers and those interested in cybersecurity. Additionally, Fedora supports a wide range of software for video editing, audio production, and animation, such as Kdenlive, Audacity, and Blender, making it a solid choice for multimedia content creators.
3. Debian: Para Administradores de Sistemas, Usuarios Avanzados y Diseño 3D / Debian: For System Administrators, Advanced Users, and 3D Design
Español: Debian es conocida por su estabilidad, lo que la hace ideal para administradores de sistemas y usuarios avanzados. Su entorno sólido también es adecuado para diseñadores 3D que buscan un sistema confiable para trabajar con software como Blender o FreeCAD. Debian proporciona un entorno de trabajo predecible y seguro, ideal para manejar proyectos de gran escala y complejidad.
English: Debian is known for its stability, making it ideal for system administrators and advanced users. Its solid environment is also suitable for 3D designers looking for a reliable system to work with software like Blender or FreeCAD. Debian provides a predictable and secure work environment, ideal for handling large-scale and complex projects.
4. Arch Linux: Para Usuarios Avanzados, Personalización Extrema y Jugadores / Arch Linux: For Advanced Users, Extreme Customization, and Gamers
Español: Arch Linux es la distribución preferida por aquellos que desean un control total sobre su sistema. Es ideal para usuarios avanzados que buscan personalización extrema y desean optimizar su sistema para el rendimiento en juegos. Arch te permite configurar tu entorno de juego con precisión, optimizando el rendimiento con herramientas como Steam y Proton para jugar títulos de Windows en Linux.
English: Arch Linux is the preferred distribution for those who want full control over their system. It’s ideal for advanced users seeking extreme customization and who want to optimize their system for gaming performance. Arch allows you to finely tune your gaming environment, optimizing performance with tools like Steam and Proton for playing Windows titles on Linux.
5. Linux Mint: Alternativa a Windows para Escritorio y Creadores de Contenido / Linux Mint: Windows Alternative for Desktop Users and Content Creators
Español: Linux Mint ofrece una experiencia de usuario familiar para aquellos que buscan una alternativa a Windows, siendo particularmente amigable para el uso en escritorios. También es una excelente opción para creadores de contenido que necesitan una distribución simple y efectiva para trabajar con herramientas como OBS Studio, GIMP y Audacity. Mint combina facilidad de uso con estabilidad, facilitando la transición desde Windows.
English: Linux Mint offers a familiar user experience for those seeking an alternative to Windows, being particularly user-friendly for desktop use. It’s also an excellent choice for content creators who need a simple and effective distribution for working with tools like OBS Studio, GIMP, and Audacity. Mint combines ease of use with stability, making the transition from Windows smooth.
6. Pop!_OS: Para Desarrolladores, Gamers y Diseño 3D / Pop!_OS: For Developers, Gamers, and 3D Design
Español: Pop!_OS es una distribución basada en Ubuntu, optimizada para desarrolladores y jugadores. Incluye soporte nativo para GPUs, lo que la hace ideal para jugar y trabajar en proyectos de diseño 3D con software como Blender. Además, su enfoque en la productividad y el flujo de trabajo eficiente la convierte en una excelente opción para desarrolladores que buscan un entorno de trabajo optimizado.
English: Pop!_OS is a Ubuntu-based distribution optimized for developers and gamers. It includes native GPU support, making it ideal for gaming and working on 3D design projects with software like Blender. Additionally, its focus on productivity and efficient workflow makes it an excellent choice for developers looking for an optimized work environment.
Ventajas de Linux Sobre Windows y macOS / Advantages of Linux Over Windows and macOS
Español: Linux ofrece diversas ventajas sobre Windows y macOS, incluyendo:
Costo: La mayoría de las distribuciones de Linux son gratuitas, lo que reduce significativamente el costo en comparación con las licencias de Windows o macOS.
Seguridad: Linux es conocido por su robusta seguridad, con menos vulnerabilidades a malware debido a su arquitectura y modelo de permisos.
Rendimiento: Linux es más eficiente en el uso de recursos, ofreciendo mejor rendimiento, especialmente en hardware más antiguo o limitado.
Personalización: Con Linux, tienes un control total sobre tu sistema, permitiendo ajustar cada aspecto según tus necesidades, lo que es ideal para usuarios avanzados y creadores de contenido.
English: Linux offers several advantages over Windows and macOS, including:
Cost: Most Linux distributions are free, significantly reducing costs compared to Windows or macOS licenses.
Security: Linux is known for its robust security, with fewer vulnerabilities to malware due to its architecture and permission model.
Performance: Linux is more resource-efficient, offering better performance, especially on older or limited hardware.
Customization: With Linux, you have full control over your system, allowing you to tweak every aspect to fit your needs, ideal for advanced users and content creators.
Conclusión / Conclusion
Español: Elegir la distribución de Linux adecuada puede mejorar significativamente tu experiencia, dependiendo de tus intereses y necesidades. Desde Ubuntu y Fedora para principiantes y desarrolladores, hasta Arch Linux para usuarios avanzados y jugadores, y Pop!_OS para creadores de contenido y diseño 3D, hay una distribución que se adapta a cada perfil. Linux ofrece notables ventajas sobre Windows y macOS, convirtiéndose en una opción atractiva para una amplia variedad de usuarios.
English: Choosing the right Linux distribution can significantly enhance your experience, depending on your interests and needs. From Ubuntu and Fedora for beginners and developers, to Arch Linux for advanced users and gamers, and Pop!_OS for content creators and 3D design, there’s a distribution that fits every profile. Linux offers notable advantages over Windows and macOS, making it an attractive option for a wide range of users.
30 notes · View notes
ixhika-jsx · 1 month
Text
Tumblr media Tumblr media Tumblr media
Resources and study tips to get you in cyber forensics
Master post • Part1 • part2
let's get you prepped to be a cyber sleuth without spending any cash. Here’s the ultimate tips and resources.
Ps: you can't become one while doing these pointers but you can experience the vibe so you can finally find your career interest
Tumblr media Tumblr media
### 1. **Digital Scavenger Hunts**
- **CTF Challenges (Capture The Flag)**: Dive into platforms like [CTFtime](https://ctftime.org/) where you can participate in cyber security challenges. It's like playing *Among Us* but with hackers—find the imposter in the code!
- **Hunt A Killer (Digitally)**: Create your own digital crime scenes. Ask friends to send you files (like images, PDFs) with hidden clues. Your job? Find the Easter eggs and solve the case.
### 2. **YouTube University**
- **Cyber Sleuth Tutorials**: Channels like *HackerSploit* and *The Cyber Mentor* have playlists covering digital forensics, cybersecurity, and more. Binge-watch them like your fave Netflix series, but here you're learning skills to catch bad guys.
- **Live Streams & Q&A**: Jump into live streams on platforms like Twitch where cybersecurity experts solve cases in real-time. Ask questions, get answers, and interact with the pros.
### 3. **Public Libraries & eBook Treasure Hunts**
- **Library eBooks**: Most libraries have eBooks or online resources on digital forensics. Check out titles like *"Hacking Exposed"* or *"Digital Forensics for Dummies"*. You might have to dig through the catalog, but think of it as your first case.
- **LinkedIn Learning via Library**: Some libraries offer free access to LinkedIn Learning. If you can snag that, you've got a goldmine of courses on cybersecurity and forensics.
### 4. **Virtual Study Groups**
- **Discord Servers**: Join cybersecurity and hacking communities on Discord. They often have study groups, challenges, and mentors ready to help out. It's like joining a digital Hogwarts for hackers.
- **Reddit Threads**: Subreddits like r/cybersecurity and r/hacking are packed with resources, advice, and study buddies. Post your questions, and you’ll get a whole thread of answers.
### 5. **DIY Labs at Home**
- **Build Your Own Lab**: Got an old PC or laptop? Turn it into a practice lab. Install virtual machines (VMware, VirtualBox) and play around with different operating systems and security tools. It’s like Minecraft but for hacking.
- **Log Your Own Activity**: Turn on logging on your own devices and then try to trace your own steps later. You’re basically spying on yourself—no NSA required.
### 6. **Community College & University Open Courses**
- **Free Audit Courses**: Many universities offer free auditing of cybersecurity courses through platforms like Coursera, edX, and even YouTube. No grades, no stress, just pure learning.
- **MOOCs**: Massive Open Online Courses often have free tiers. Try courses like "Introduction to Cyber Security" on platforms like FutureLearn or edX.
### 7. **Scour GitHub**
- **Open-Source Tools**: GitHub is full of open-source forensic tools and scripts. Clone some repositories and start tinkering with them. You’re basically getting your hands on the tools real investigators use.
- **Follow the Code**: Find projects related to digital forensics, follow the code, and see how they work. Contribute if you can—bonus points for boosting your resume.
### 8. **Local Meetups & Online Conferences**
- **Free Virtual Conferences**: Many cybersecurity conferences are virtual and some offer free access. DEF CON has a lot of free content, and you can find tons of talks on YouTube.
- **Hackathons**: Look for free entry hackathons—often universities or tech companies sponsor them. Compete, learn, and maybe even win some gear.
### 9. **DIY Challenges**
- **Create Your Own Scenarios**: Get a friend to simulate a hack or data breach. You try to solve it using whatever tools and resources you have. It's like escape rooms, but digital.
- **Pen & Paper Simulation**: Before diving into digital, try solving forensic puzzles on paper. Map out scenarios and solutions to get your brain wired like a detective.
### 10. **Stay Updated**
- **Podcasts & Blogs**: Tune into cybersecurity podcasts like *Darknet Diaries* or follow blogs like *Krebs on Security*. It’s like getting the tea on what’s happening in the cyber world.
### 11. **Free Software & Tools**
- **Autopsy**: Free digital forensics software that helps you analyze hard drives and mobile devices. Think of it as your magnifying glass for digital clues.
- **Wireshark**: A free tool to see what's happening on your network. Catch all the data packets like you're a digital fisherman.
### 12. **Online Forensics Communities**
- **Free Webinars & Workshops**: Join communities like the *SANS Institute* for free webinars. It's like attending a masterclass but from the comfort of your gaming chair.
- **LinkedIn Groups**: Join groups like *Digital Forensics & Incident Response (DFIR)*. Network with pros, get job tips, and stay in the loop with the latest trends.
### 13. **Practice Cases & Mock Trials**
- **Set Up Mock Trials**: Role-play with friends where one is the hacker, another the victim, and you’re the investigator. Recreate cases from famous cybercrimes to see how you'd solve them.
- **Case Studies**: Research and recreate famous digital forensic cases. What steps did the investigators take? How would you handle it differently?
Tumblr media Tumblr media
There you have it—your roadmap to becoming a cyber sleuth without dropping a dime. You don't have time find your interest after paying pennies to different ppl and colleges. You can explore multiple things from comfort of your home only if you want to.
Tumblr media
20 notes · View notes
bat-snake · 2 months
Text
Thinking about the 2020 Zoom into Xadia conference again, between the psudo-modern AU Cast on Zoom opening and then the tabletop game.
Between people continuously breaking into the Zoom call through one way or another, Rayla and Callum being in the same room and trying to deny it, Soren on cybersecurity but accidentally sending Claudia a link, Viren Dadding It Up and not knowing how to get out...nor is he entirely sure how he got in. And finally Aaravos yells at them for complaining when he's been "involuntarily social distancing for centuries" and claiming to be on every call all the time...while having a bad connection and his voice cutting out (must have been a nasty storm in the Sea of the Castout thinking about it now)
And of course the utter disaster of the Tabletop game that makes Aaravos rage quit and end the game because everyone immediately broke out into a fight after finishing their character introductions. (Which actually has my favorite Aaravos line read even though it's not cannon, and it's the weary "Viren???" when he calls him to describe his character)
22 notes · View notes
codemiracle · 11 months
Note
I am so happy that i am the first one to ask👉👈♡(> ਊ <)♡
Btw i wanted to ask more about Tatsuya and Seth ...they look dangerous but so cool..and does yuuta have haemophilia ..i guess.. and your artstyle is so beautiful and you draw the expressions so intricately... (◍•ᴗ•◍)❤I became your fan...
(~ ̄³ ̄)~ i fell in love with almost all of them..
i am so much interested to know more about them..i will be waiting for other characters' introduction and likes dislikes too..and i found yotsuya cute due to his character introduction stuff but when you told me more about it that's he's not as good actually i was shocked now he's the most interesting character for me...i cant wait for the game ..when will it come out..i will even read a webtoon with these characters...btw don't take a burden i am just asking in a lighthearted manner ..take care of yourself too...thank you !
Btw can i be 🤍 anon???
Aww, you're too sweet!! Thank you so much for your kind words!! <3 (๑>◡<๑) You really boosted my self-esteem hehe. The game will come out probably in a demo maybe next year? it's going to be a really packed game with a lot of content (or so I hope) It's funny because Seth was going to be the protagonist of a webcomic I was planning but I ditched the idea because it really wasn't my thing (I like making short comics though!). But I'm planning to make an RPG maker game with him (˵ •̀ ᴗ - ˵ ) ✧ I can give you some little silly details about Seth and Yotsuya just for the funsies! ✦ ┆・Seth enjoys taking care of flowers because he likes the feeling of caring for something alive (he'd like to get a puppy too.) His favorite flowers are Marigolds and Sunflowers. His least favorite is Roses (he hates the thorns.) ✦ ┆・Seth is really tall, about 1,97 c. m. (about 6,5 feet I think??) He can change his size though. ✦ ┆・Seth Likes to learn about anything and everything and thanks to him being a machine he has an extremely photographic memory, that can be a little dangerous, though he will remember anything you tell him, so you better not lie! ✦ ┆・Seth rarely stops smiling, he doesn't know very well about expressing his emotions. So he tries to smile all the time, it looks a little uncanny and to be honest he likes being a little creepy. When he's not smiling, that's not a good signal at all. ✦ ┆・Yotsuya like a good stressed office worker likes gambling... a lot. Don't worry he's not addicted or anything and he's pretty good at the games he plays, especially poker, his poker face is on point (*wink wink*) ✦ ┆・Yotsuya hates germs, he kinda hates using public transport like trains or buses just because he hates the feeling of being in the same space with other people. He doesn't mind you tough, you're not disgusting to him at all! ✦ ┆・Yotsuya knows a lot about cybersecurity, he worked as a programmer for a company for quite some while, quite dangerous knowledge for a stalker like him if you ask me. (And his house is pretty secure too, he has cameras around all the corners.) Take care of yourself too, anon! Hope you have a great day! <3
140 notes · View notes
elkement · 3 months
Text
Tumblr media
"Eye of the Harmonograph" by elkement 2024. 3D Lissajous figures.
Thinking about inspiration today! Once, an art platform was asking about who - which artists - have been inspiring me. I want to recapture which artists came to my mind when I filled in that artist profile:
~ Physicist (and noble prize winner) Roger Penrose. I read his book The Road to Reality during the pandemic. Consider it a "popular science book", but nit shy of adding mathematics. I was most enchanted by his hand-drawn old-school illustrations. This book inspired both my attempts at drawing, as well as my digital art. The latter indirectly as my visualization of intriguing functions mentioned by Penrose finally made me install SageMath... which led me to explore threejs and math-related digital art.
~ M. C. Escher who will not need any introduction. I once read he has been more revered among mathematicians than among artists. I don't care. "Gödel. Escher, Bach" was THE formative, influential book of my teenage years. I had always figured, Gödel was my hero. I was into math, not art and music. Or so I thought. Now, I think that maybe, it was Escher after all.
~ An Austrian polymath, the late Peter M. Schuster. He was a laser physicist by training, started a laser physics company, then became a science write specializing in biographies of Austrian physicists, funded a museum called a "Center for the History of Physics". He published poetry and mentioned in an interview he was on the fence of studying either physics or literature. (I wrote kind of a tribute here: https://elkement.art/2021/04/11/peter-m-schuster-on-history-of-science/).
With a little deliberation, I'd add the following three today:
~ Douglas Hofstadter, the author of Gödel, Escher, Bach. His books has stunning images, including also a plot he created during his PhD in solid state physics. I had forgotten that in the meantime, but I guess the fact(?) that a PhD in physics could prepare you for a career / life of making connections between all kinds of hard sciences, arts and literature was certainly something that might have shaped my worldview. My thoughts about Gödel. Escher, Bach including quotes of Hofstadter - how he was thinking about the reception of his book: https://elkement.art/2014/04/26/godel-escher-bach-and-strange-loops-nostalgia-and-random-thoughts/
~ Clifford Stoll - also a wanderer between worlds (https://en.wikipedia.org/wiki/Clifford_Stoll), also between worlds dear to me. An astrophysicist who became an expert in cyber security and accidentally started the field of reverse engineering. His book The Cuckoo's Egg is legend in cybersecurity circles. But before I read his book, I actually stumbled upon a video of his: Where he talks about selling ... Klein bottles of blown glass, out of his charming "Doc-Emmet-Brown-style" workshop and art studio!
~ Paul Friedlander - an artist (with degrees in physics and in fine arts) who pioneered what may now be called New Media Art. Look at his light sculptures: https://paulfriedlander.com/Gallery.html . I saw an interview with him... and he also has a Doc-Emmet-Brown-style workshop and art studio. Adding him is actually cheating, or time-travelling. I was quite a while into my own kind of digital art inspired by physics when I stumbled upon an interview with him. But I could not help thinking: Would I have started creating sooner had I noticed that artists like that do actually exist?
11 notes · View notes
newcodesociety · 8 months
Text
1 note · View note