Professionally Evil Insights

LD_PRELOAD - Introduction

    Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is related to Linux based systems and...

Boolean Math (OR Logic) – CISSP Domain 3

Today we are going to take another look at some Boolean mathematics.  In particular, we’re going to focus on the OR operational logic, as covered in...

Proxies, Pivots, and Tunnels - Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things.  However, to me, these terms could mean...

Boolean Math (AND Logic) - CISSP Domain 3

Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of the CISSP common body of knowledge (CBK).  To begin...

The OPSEC of Protesting

For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony...

Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials.  Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very...

Encoding – CISSP Domain 3

Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion...

Summer Internship at Secure Ideas

This past summer, I worked as an intern for Secure Ideas. My role at the company was that of software developer, designing applications to streamline...

Bash Tips and Tricks

I know I definitely identify with being a visual learner, and I am happy to help where I can with creating content for the security/sysadmin (system...

Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  There is often some...