Henry CheungPicoCTF: Level 1: SubstituteLike most of the flag titles, this one provided a clue in the title. At first glance, looking at the title and the page, I thought there…Apr 27, 2018Apr 27, 2018
Henry CheungCyber-Security IconsDuring this week, I had the privilege of researching two people in the cyber security world, one of which I have heard of before, the other…Apr 10, 2018Apr 10, 2018
Henry CheungThe Client-Server ConnectionImagine using the ATM at a bank to withdraw some money from your account. What you’re really doing is requesting connection from you (the…Apr 2, 2018Apr 2, 2018
Henry CheungNot My Average ProbeThe nmap, or network mapper, is a Linux program used to identify what is on a given network. It can be used to find ports, operating…Mar 5, 2018Mar 5, 2018
Henry CheungConfiguring Network DevicesComputers may seem intimidating to learn at first, but calm down, take a breath, maybe a step outside, and let’s do this together.Nov 13, 2017Nov 13, 2017
Henry CheungWork. Network.Networks at first glance may seem overwhelming, but like many things created by us humans, the system of networks is modeled like how we…Oct 29, 2017Oct 29, 2017
Henry CheungDecipher the Writer!Sjg eqpf ltupdl wmjr ijfe, P bxf ejmu ej tkvjut lz ltffxrtf. Eqt vpiqtg P dftu bxf x ebjfeti igjvtff, wde tctk eqtk ujtf eqt ltffxrt…Oct 23, 2017Oct 23, 2017
Henry CheungFirewalls: The Ins and OutsFrom the previous reading, we have established what exactly a firewall is and how it works on different levels. Now, let’s take that…Oct 2, 2017Oct 2, 2017
Henry CheungVending Machines: Manual ManualRecently, I’ve partaken in a minor researching glance at the hacking of vending machines, how it can be done, and how it can be prevented…Sep 23, 2017Sep 23, 2017
Henry CheungMonitoring Suspicious ActivityWithout protection, anything is vulnerable. In the wild, without parental guidance, baby animals are prey to predators. In an urban…Sep 18, 20171Sep 18, 20171