pseudorandom_outputTwitter Implements LightningThe headline says it all, with Twitter integrating Strike’s lightning application into their profile settings. A Tweeter can now transmit…Sep 24, 2021Sep 24, 2021
pseudorandom_outputVolatility is one of Bitcoin’s greatest weaknesses (professional traders may disagree).With great gains, comes great responsibility to not sell something because of shortsightedness. If you bought $20 worth of Bitcoin at the…Sep 21, 2021Sep 21, 2021
pseudorandom_outputThis is the Bretton Woods debate all over again, except this time we have a stable issuance and…Gold supply isn’t restricted by exorbitant shipping fees due to its physical mass. Governments don’t need to issue their own currency which…Sep 19, 2021Sep 19, 2021
pseudorandom_outputWriteup Week 8For this week, we covered message security which encompasses mostly email protocols and spam filtering. Email protocols such as SMTP and…Aug 17, 2019Aug 17, 2019
pseudorandom_outputFinal WriteupWe started Hack the Box by looking how to get the invite code. The first step we took was to inspect the element using Firefox. At the…Aug 17, 2019Aug 17, 2019
pseudorandom_outputHam vs SpamIn this last assignment, we are required to classify a json data set of over 2000 emails between malicious or not (spam vs ham). By using…Aug 16, 2019Aug 16, 2019
pseudorandom_outputWriteup 7This week, we covered web security with topics such as user-level attacks such as phishing and SEO poisoning. Most web-attacks are…Aug 12, 2019Aug 12, 2019
pseudorandom_outputWrite-up Week 6This week we covered network security and the network protocols necessary to determine what types of network there are when looking at…Aug 7, 2019Aug 7, 2019
pseudorandom_outputWriteup 5 — Windows InternalsThis week, we learned about Windows internals, rootkits, and bootkits. All of the files belonging to the Windows kernel carry a .sys…Jul 29, 2019Jul 29, 2019
pseudorandom_outputWeek 4 Software VulnerabilitiesThis week, we covered the “attack” side of things in information security. We looked into javascript vulnerability of Internet Explorer in…Jul 22, 2019Jul 22, 2019