collininfosec – blog and portfolio

collininfosec – blog and portfolio

  • home
  • blog
  • services

Blog

Cybersecurity Portfolio Showcase

  • Terminal Tales: PAM Like a Pro. Lock yourself out of your Linux machine, then get back in.

    Terminal Tales: PAM Like a Pro. Lock yourself out of your Linux machine, then get back in.

    Introduction Welcome to the fortress gate of your Linux box: PAM. This framework silently guards every login, sudo attempt, SSH…

    8/9/2025
  • Terminal Tales: Securing The User Jungle. A Practical Guide To Linux Account Hardening

    Terminal Tales: Securing The User Jungle. A Practical Guide To Linux Account Hardening

    This post is part of a Linux Security Blog Series. [View the full series here.] Introduction Before you start patching…

    7/25/2025
  • Terminal Tales: From Breach Curiosity to System Integrity. My Journey into Linux Security Hardening.

    Terminal Tales: From Breach Curiosity to System Integrity. My Journey into Linux Security Hardening.

    🚀 Start Here:👉 [Linux Account Hardening Guide]👉 [PAM Like a Pro] Introduction This series documents lab-tested Linux hardening practices with…

    7/24/2025
  • Cloud-Based Password Security in the Quantum Age: How to Deploy It

    Cloud-Based Password Security in the Quantum Age: How to Deploy It

    Introduction Keeping track of passwords is frustrating. You know you shouldn’t reuse the same one for every account, but creating…

    5/13/2025
  • From Vulnerable to Secure: Nessus, Exploits & Remediation

    From Vulnerable to Secure: Nessus, Exploits & Remediation

    Introduction Cybersecurity is a constant battle between attackers finding weaknesses and defenders patching them. To truly understand this dynamic, I…

    5/6/2025

Menu

  • home
  • blog
  • services

Contacts

contact@collininfosec.com

Socials

  • LinkedIn
  • X

© 2025 collininfosec. All rights reserved.

Notifications