Cybersecurity Portfolio Showcase
-

Terminal Tales: PAM Like a Pro. Lock yourself out of your Linux machine, then get back in.
Introduction Welcome to the fortress gate of your Linux box: PAM. This framework silently guards every login, sudo attempt, SSH…
-

Terminal Tales: Securing The User Jungle. A Practical Guide To Linux Account Hardening
This post is part of a Linux Security Blog Series. [View the full series here.] Introduction Before you start patching…
-

From Vulnerable to Secure: Nessus, Exploits & Remediation
Introduction Cybersecurity is a constant battle between attackers finding weaknesses and defenders patching them. To truly understand this dynamic, I…

