Child’s Play

11:00 – I got sick of dealing with update problems and latency just for a child’s laptop so decided to kick out Windows 10 in favour of any Linux OS.

It’s been a while since I’ve had to mess with laptop operating systems and ran into a MotherLoad of installation problems. 

17:56 – Still trying to overcome a looping problem of “OS not found” WTF.

20:16 – Finally got rid of the troublesome Windows partition and Ubuntu seems to boot up fine and running like a Leopard.

21:08 – Firefox on Ubuntu not compatible with Netflix….Are you fucking kidding me right now?  Error Code: F7344-1204

22:08 – Install Chrome via Command Line and it worked with Netflix

Difficulty level – positivity impossible for your casual end-user

The ultimate tester will be the child herself

Accidental Bucket list

The words Summit and Peak will never be the same again for me.

Yesterday, I inadvertently ended up trekking 612 metres up to Alpl 14, Krieglach, Austria.  I’m a born Londoner so pretty much used to staying at no higher than 35 metres about sea level.

It was a combination of crowd trekking and sheer mental concentration to push my body to do what it didn’t want to do.  Reaching the Summit was absolutely wonderful, my heart filled up with massive waves of happiness and my aching muscles were quickly forgotten.

The mountains in Horizon Zero Dawn are brilliant but the real-life view and air from the top of an actual mountain is simply to die for.

40 minutes of hiking up blindly ended up being a really important life lesson to self.  I now know why people train for months and end up being addicted to trekking and conquering mountains.   A work colleague reached the Summit of Mount Kilimanjaro which is over 5000 metres up, now the magnitude of their achievement has suddenly dawned on me.

600 metres about Sea level

Today, I’m reflecting on my shock achievement and trying to soothe my muscles.

I WILL do it again.

Mr. Do! Walking away from the Internet, Intranet, Extranet, Deep Web and DarkWeb

One of my heart’s desires is to walk away from internet connected technologies.

Every day after school in the 80’s

Sounds like career suicide for an Information Security Professional and a little hard to see how I could ever untangle my encrypted connections. My thoughts go back to my first glimpse into tech, as a kid, into Mr. Do! , one day after leaving Bakers Arms, Leyton, East London and heading to E10 7LS.

Arcade folk who didn’t even know my name would eventually call me Mr. Do! because I was always hitting high scores. I had worked out the routines and backdoors.

Who knew my backdoor talents would bury itself so deep into my Digital DNA.

Anyhow the irony of posting something like this on a blog is evident so don’t go there, Sherlock.

I’ve had a touch of the off-line life and I know I can thrive there, especially using a different part of my brain but for now, I’m on it 15-18 hours a day Work, Family, Love and Play.

InfoSec skills – Computer Emergency Response Team (CERT)

As a Small Business or individual, If you were going to hire a Private IT Security Professional here’s what you should be looking for.

Trust me I’m a Professional – Until Dawn™

Loving this 2016 IT Security Job Description

Experience as part of an incident response team (either in-house or as a consultant).

An ability to provide technical analysis and direction for investigations.

An understanding of networking protocols and infrastructure designs; including, firewall functionality, routing, encryption, host and network intrusion detection systems, load balancing, and other network protocols.

An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security.

Willing to work out of hours and public holidays as part of a shift Rota and when on call as needed.

Inherent passion for information security and service excellence.

An ability to analyse and reverse engineer various file types including providing dynamic and static analysis of malware artefacts and binaries as well as other malicious attack files.

Be able to complete post-mortem analysis of network logs, traffic flows and other activities to identify malicious activity on a network.