Judges Chapter 16 verse 17

“And her told her ALL his heart”

Vulnerability management is a rolling issue, untested patches can mess up your IT systems but ignoring “updates” the writing on the wall can be detrimental to your infrastructure. The insider threat is not talked about as much nowadays namely because the definition of what is an insider is foggy.

With all the juicy bits of data, we knowingly share it’s arguable that we are part of our own downfall.

Since biblical times we know that telling ALL to your closest will eventually reveal your tendons for all to see and exploit.

Meanwhile, the first 24 hours FarCry5 hype is over and whilst it is not dominating it is certainly well up in the top games to play.  Now I can settle down to some good side stories and have actually figured out how to catch fish.

Changing focus for April

Day 2 of Family Court action

Ethical justice

Aiding and abetting is a standard crime in the physical world.  The message is being pushed out strongly to Malware authors that if your tools are used in a crime you will be prosecuted.  Security researchers face the same challenge but abide to ethical standards.

No more hiding behind the keyboard

Taylor Huddleston was selling this tools for a bargain at 25 USD, it worked and naturally was a hit with all types of hackers.  Read on

Why can’t this same approach tackle the rampant gun crimes in the US?

Ethically inappropriate?

Disaster recovery

It’s never gonna happen but when you are hit with a major digital failure it’s always good to where your data is.

Despite having a fairly robust set-up it’s really hard to stay focused and not succumb to the emotional inconvenience of an IT failure.  It always happens when you are busy, traveling and distracted with real life.  Individuals seldom practice the scenario and companies are on high alert standby to fleece you of any hard earning monies to fix the issue.

“everyone has a plan until they get punched in the mouth”. Mike Tyson

Titan Attacks! Did you Back-up today?

Today is Sunday

I promptly starting preparing for the Monday morning blitz on my senses.  I found myself delaying the morning commute and slowing packing my mobile office for relocation but wait….it’ Sunday.  I haven’t spoken to a real-life person in 48 hours and the curtains have been drawn throwing out my perception of time.

My devices confirm, Yes, it is Sunday but I’m dreading Monday.  Dreading having to see people, talk, explain, attend meetings, reason and give my opinion on anything.  Second-hand bereavement, like group bereavement, is a stealth problem that creeps up on you.  When Timothy Hampton died, 1 day before my birthday, I was sent into a downward swirl of unjustified grief. I had so many reasons to be happy yet this unexplained tragic death forced me to deny my very existence.

Hellblade: Senua’s Sacrifice wakes the voice in your head.

Almost 9 years later the overwhelming emotions of second-hand loss are here again.  It’s like I don’t deserve to be sad, after all it wasn’t my Loved One, yet the feeling is here as real as anything and nobody knows it but me.

I found a few opinions on the stages of bereavement so hope I can fast track to Acceptance and hope soon.

Absolute denial
Pain & guilt
Anger & bargaining
"depression", reflection, loneliness
Turning point – Clearing out
Reconstructing your Life
Acceptance & hope

Today is Sunday

Excuses to stealth

At age 14, I strategically used Valentines Day to anonymously share my feelings with girls I fancied or admired in class and watch from a safe distant never revealing myself in person.

Today it’s almost impossible to be truly anonymous and successful hiding is actually frowned upon as freakish and creepy.  The same techniques to surprise a Loved One can be used to destroy, mislead or corrupt without trace but It comes down to moral intentions and belief systems. Valentine’s Day is the perfect excuse to bring out the undetected schemer in you.

Stealth: The ability to reach and/or kill your target without detection.

Stealth mood is one of the most satisfying gaming strategies built into a wide genre of titles, in fact, many games award or punish you based on your stealth skills.  I’m rather addicted to stealth IRL and in my digital playgrounds, the best penetration testers often adopt this mindset to their core.

“The quieter you become, the more you are able to hear.”  Kali OS

Make me redundant

In my early career, the word redundancy used to strike fear into my well-being. Decades later it’s a place a comfort and represents resilience.  Backing up the backup and testing the back-up routinely is an easy habit to adopt. Sadly. For  many end users, they simply store all their precious data on a single device with unknown backup status.

Where’s my data?

A family member nearly lost over 5000 images because they critically failed to even grasp the relevance of backup or data management.

The strategy should always be protecting the data first and the end-point device second but unfortunately, we love our shiny phones way too much to think that way.

Zero gameplay or medication today