This will be a multiple part post outlining my opinions of homelab setups and what you should consider when building your lab. I will also include a few resources I can vouch for and have used. Furthermore, I do not claim to have all the answers and your setup/needs will…

Information Security, cybersecurity or any flavor of security plus technology interest has skyrocketed and expected to grow exponentially. The reason is justified, criminals have moved into this section and been successful in exploiting victims for money then cycling those funds into developing more profitable ways to exploit targets. Furthermore, the…

Recently, there has been an overwhelming amount of discussion over WhatApp’s non-existent “Government backdoor”, which can easily be debunked with the following statement:

If Facebook wanted to allow any government to have a back door, they own the code base, they could just code one in. You wouldn’t know it…

At the end of the year, I like to do a good, bad and ugly audit to really prepare my focus for the following year. As I don’t get bent out of shape over celebrities and reality stars dying, the best way for me to see how 2016 was is…

Ransomware, malicious software designed to encrypt a victim’s hard drive and charge a ransom for the recovered files, has been reigning terror or organizations and users for a number of years now. The business model has always been simple, infect the user through spam e-mail or other vectors of infection…

Josh Stepp

Netsec Analyst and Lifelong Learner/Researcher

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store