Month: February 2019

  • Bridging Captive Portals

    So, I’m working on my research project, and it involves a bunch of virtual machines (which I have set up according to @da_667‘s instructions from his book). Cool, too easy, everything works fine. …until I have to travel. Fortunately, my lab fits on my laptop. Unfortunately, when I connected to hotel Internet, none of my […]

  • Supporting the Business

    In Information Security (Infosec), one of the first things most of us learn is the concept of CIA – Confidentiality, Integrity, and Availability. This is such an important concept that is part of US Code: (1) The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction […]