Pinnedai-guapoAnalyzing the Risk Associated with Domestic and International Usage of 2G on COPE, BYOD, and CYOD…Encrypted GSM traffic can be captured over-the-air with RTL-SDR devices. This would allow anyone to sniff and capture GSM traffic with a…Nov 21, 2023Nov 21, 2023
ai-guapoExploring Possible Vulnerabilities of NYC’s New Job Application Process (cityjobs.nyc.gov).We’re all aware that local and state governments tend to be slow in adopting new technology (consider the lengthy wait times for simple…Jun 26Jun 26
ai-guapoHow to read those pesty LinkedIn ‘message requests’ without triggering a read notification.If you’ve been using LinkedIn for a while, you’ve likely encountered your fair share of unsolicited messages. It’s important to note that…Jan 8Jan 8
ai-guapoKeygen Music: The Soundtrack of Early 2000s Piracy. And How Sandboxing Made It All Possible.My first experience with sandboxing started years ago when keygens were a thing. For those of you who don’t know what a keygen is, keygens…Nov 30, 2023Nov 30, 2023
ai-guapoAcing the Subnetting Part of the CompTIA Network+ Certification. Part 2Now that we know what makes up an IPv4 address and how to convert it to binary and back, we can now focus on subnetting.Nov 29, 2023Nov 29, 2023
ai-guapoAcing the Subnetting Part of the CompTIA Network+ Certification. Part 1.One of the biggest worries I had before taking the CompTIA Network+ was the subnetting portion of the exam. Most advice I read on…Nov 29, 2023Nov 29, 2023
ai-guapoHow to protect your geolocation when behind a VPNOne important step you can take in obfuscating your online digital identity is by implementing a VPN. A VPN together with browsing in…Nov 29, 2023Nov 29, 2023