Archives

Categories

Support Me

SEC 350 - Computer Forensics Scenario

My IT department has just created an IR/Computer Forensics team; I'm tasked with setting it up.

SEC 420 Disaster Recovery & Business Continuity overview

An overview of business continuity and disaster recovery.

SEC 420 Cybersecurity and Infrastructure Security Agency overview

An overview of CISA. What they do, and how they came to be.

PHI 314 Cyber Security Practice

Some questions for class regarding firewalls, cyberterrorism, malware, spam, and phishing.

How to block pesky spam based on the unsubscribe url using the Thunderbird email client

Catch spam by checking the contents of the url in the unsubscribe link by adding an extension that allows a complete scan of the contents of an email via regular expressions.

Networking case-projects 6

Case Projects 6-1,6-2,6-3 Guide to Networking Essentials 7th Edition by Greg Tomsho.

Configure automatic backup of mysql databases and configure to sync with cloud storage

mysql database info can be very precious (in my case my own wiki database). Here's how to create automatic local backups and set up the local back folder and subfolders to work with cloud storage automatically as well.

Networking case-projects 5

Case Projects 5-1,5-2 Guide to Networking Essentials 7th Edition by Greg Tomsho.

Networking case-projects 1

Case Projects 1-1,1-2,1-3,1-4 Guide to Networking Essentials 7th Edition by Greg Tomsho.