• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    What Is a CSIRT vs. CERT vs. CIRT???

    June 8, 2021 /

    CSIRT—Computer Security Incident Response Team is a concrete organizational entity (i.e., one or more staff) that is assigned the responsibility for coordinating and supporting the response to a computer security event or incident. CERT—Computer Emergency Response (Readiness) Team CERT should not be generically used as an acronym because it’s a registered trademark in the United States Patent and Trademark Office, as well as other jurisdictions around the world. Alternative names fur such groups include computer emergency readiness team and computer security incident response team (CSIRT). The name “Computer Emergency Response Team” was fist used in 1988 at Carnegie Mellon University (CMU). CERT is registered as a trademark by Carnegie Mellon…

    read more
    Aaron Comments Off on What Is a CSIRT vs. CERT vs. CIRT???

    You May Also Like

    Notes to Self 11/05/2020

    May 20, 2021

    Billions were stolen in blockchain hacks last year…

    January 18, 2021

    Understanding Permissions: Notes: List of Terminal Commands

    May 20, 2021
  • Tech

    How Was Colonial Pipeline Hacked/Breached? Because of One Single Employee’s Compromised Password

    June 7, 2021 /

    That’s all it takes, and usually what it comes down to. Passwords. As the founding contemporary lyrical wordsmith members of Wu-Tang would say, “Protect ya neck!“. Because without it, you’ll lose your head. Same with passwords! Protect ya passwords!!! All a malicious actor would need is a password to an account, and just like that (*finger snap!*), you’ve invited them in, like welcoming Count Dracula through your front door for Sunday dinner. So, Colonial, right…here’s the latest. After an analysis of the cyberattack on Colonial Pipeline, investigators suspect that hackers obtained the password from the dark web (think a marketplace for illicit activity) where such info is available for the…

    read more
    Aaron Comments Off on How Was Colonial Pipeline Hacked/Breached? Because of One Single Employee’s Compromised Password

    You May Also Like

    Functions, & O.O.P.–C++ Notes (C Plus Plus Notes)

    May 25, 2021

    Integrating Security Into Networking From The Ground Up…

    December 30, 2020

    Arch Linux/Slackware Linux Install Notes

    June 1, 2021
  • Tech

    What is Attack Surface?

    June 2, 2021 /

    Attack surface. First thing I start thinking is the surface area, or the exposed area that is susceptible to a cyber onslaught by threat actors, or bad people with malicious intent. According to Wikipedia: “The attack surface of a software environment is the sum of the different points (for “attack vectors”) where an unauthorized user (the “attacker”) can try to enter data to or extract data from an environment. Keeping the attack surface as small as possible is a basic security measure.” via Wikipedia “KEEPING THE ATTACK SURFACE AS SMALL AS POSSIBLE IS A BASIC SECURITY MEASURE.” **clap, clap** Does that last line stick out to anyone else?? It should.…

    read more
    Aaron Comments Off on What is Attack Surface?

    You May Also Like

    What is Traffic Light Protocol (TLP)?

    June 2, 2021

    TCP/IP Basics–The World of TCP/IP–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 12, 2021

    Blockchain & Money: Session 5: Blockchain Basics & Transactions, UTXO, & Script Code by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 15, 2021
  • Tech

    What is Remote Code Execution?

    June 2, 2021 /

    What is Remote code execution (RCE)? A simple web search brings up a Wikipedia page on Arbitrary code execution (ACE). According to Wikipedia: In computer security, arbitrary code execution (ACE) is an attacker’s ability to execute arbitrary commands or code on a target machine or in a target process. An arbitrary code execution vulnerability is a security flaw in software or hardware allowing arbitrary code execution. A program that is designed to exploit such a vulnerability is called an arbitrary code execution exploit. The ability to trigger arbitrary code execution over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution…

    read more
    Aaron Comments Off on What is Remote Code Execution?

    You May Also Like

    Amazon’s “Sidewalk” Mesh Network Goes Live; All Devices Are Opted-In Automatically By Default

    June 8, 2021

    Blockchain & Money: Session 17: Secondary Markets and Crypto-Exchanges, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021

    Blockchain & Money: Session 22: Trade Finance & Supply Chain, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 23, 2021

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2025 Starby Four.
Ashe Theme by WP Royal.