Ricky BennettinInfo Sec DailyCustomizing Your Bash Command Prompt in LinuxThe command prompt, often referred to as the “shell prompt,” is the text interface in a Linux terminal where you interact with the system…Sep 5, 2023Sep 5, 2023
Ricky BennettinInfo Sec DailyInformation Security in the Internet Age: Challenges and StrategiesIn our increasingly digital world, information security has become paramount. As technology continues to advance, so do the threats to our…Sep 4, 2023Sep 4, 2023
Ricky BennettinInfo Sec DailyHow to Wipe Empty Disk Space With UbuntuThis article will cover how to wipe the empty disk space on an Ubuntu machine to protect against data recovery.Jul 31, 2023Jul 31, 2023
Ricky BennettinInfo Sec DailyUse Wazuh with Linode for System MonitoringThis article will cover installation and deployment of the Wazuh IDS platform using Linode to host the deployment. Wazuh is a free…Jul 22, 2023Jul 22, 2023
Ricky BennettinInfo Sec DailySearch Logs in Security OnionThis is a walk-through of the Analyzing Logs portion of the Analyzing, Filtering, and Searching Event Log and syslog Output lab created by…Jul 20, 2023Jul 20, 2023
Ricky BennettinInfo Sec DailyUsing Security Onion for IDS AnalysisThis will be a walk-through of the Security Onion and Kibana sections of the Infosec Learning Lab Analyzing, Filtering, and Searching Event…Jul 19, 2023Jul 19, 2023
Ricky BennettinInfo Sec DailyUsing the Stat Command in Linux to View File MetadataViewing file metadata is important to show when a file was created, changed, and accessed on a Linux system. This can help us identify…Apr 5, 2023Apr 5, 2023
Ricky BennettinInfo Sec DailyHow to Install Kali Linux for VirtualBox using VagrantThis article will cover installing a Kali Linux VM to VirtualBox using Vagrant. You will need VirtualBox and Vagrant already installed on…Mar 17, 2023Mar 17, 2023
Ricky BennettinInfo Sec DailyVulnerability Scanning With OpenVAS and Metasploit FrameworkIn this article we will be demonstrating briefly how to use OpenVAS and the Metasploit framework to conduct vulnerability scanning on a a…Mar 14, 2022Mar 14, 2022