Andrew DoumaPatterns of Secure Architecture & Security Engineering IIModern-day security patterns & frameworks.Oct 5, 2019Oct 5, 2019
Andrew DoumaPatterns of Secure Architecture & Security Engineering IHistory of defensive patterns.Jul 25, 2019Jul 25, 2019
Andrew DoumaPassword (IN)SANITY: Intelligent Password Policy & Best PracticesPassword policies need to evolve as we learn how humans use and abuse them: current best practices and imminent threats.Aug 9, 2017Aug 9, 2017
Andrew DoumaSecuring an Android Phone or Tablet (LineageOS)Corporations prioritize new sales over securing older hardware. This leaves Android users to fend for themselves. Upgrade your device…Apr 3, 2017Apr 3, 2017
Andrew DoumaHacker to Security Pro! On the Shoulders of #InfoSec GiantsI want to do my part to demystify IT Security — to exclaim to the world that it isn’t rocket science!Mar 3, 20171Mar 3, 20171
Andrew DoumaFull Disk Encryption with VeraCryptA straightforward guide to getting you working with VeraCrypt. Protect sensitive data on your hard-drive, USB stick, and external drives.Feb 22, 20174Feb 22, 20174
Andrew DoumaPenetration Testers’ Guide to Windows 10 Privacy & SecuritySafeguarding the privacy and security of myself and my clients’ data — while still allowing me to execute a penetration test is the goal.Dec 24, 201613Dec 24, 201613
Andrew DoumaAntivirus in 2017: Why? Which? How?Teach anyone how to find an efficient and free Anti-malware product within 20 minutes by sending them this article. (July ’17 Edition)Nov 2, 20165Nov 2, 20165
Andrew DoumaFinding the right exploit codeI am often looking for the right exploit code, to test and learn from in a lab setting, adapt and use during a penetration test, or to help…Sep 20, 20163Sep 20, 20163
Andrew DoumaEvaluating Qubes OS as a Penetration Testing PlatformWith my new hardware in hand, I set out to discover what Qubes OS is good at and for which use cases it may be suitable.Sep 15, 20162Sep 15, 20162