bm90aGluZyB0byBzZWUgaGVyZQo= Archive page - Necurity

Exams and Training in Infosec

Summary

Recently I have seen a trend of people posting things on LinkedIn along the lines of “I have achieved X which makes me Y” or “I’ve not bothered with exams because they are useless”. One post in-particular made me think, what exams are there? Are they needed? Are they useful? and is it possible to write a post which will make most people hate, and judge me? (I hope not!). In this post, I am going to look at a few of the options of training and certification in the industry as it stands, and such it may come across a tad ranty.


Mounting this, that and everything else in Kali

Summary

I always come across contain files such as VHD's, OVA's, XVA's and IMG's during tests, and I always forget the exact procedure for converting, and then mounting them in Nix. I will update this over time with mounting different file types encountered. This post will be updated over time whenever I need to mount something new.


Studying for and taking the CREST CPSA Exam

Summary

I Have recently studied for and passed the CREST CPSA Exam, I though I would share some thoughts and my pre-exam revision Notes to help other people thinking of taking this new exam from crest as when looked I could not find much about it!. Note: The Format of the exam is changing very very soon, so this may not be of use to you.


Redhat Spacewalk Tutorial | Kickstarts and Configuration Management

Summary

Spacewalk offers the ability to generate and deploy Kickstarts (standard builds, keep an eye on packages that are installed on the system as well as compare any file that is on the remote machine to a local copy, giving I.T management an overview of which systems require patching or are not conforming to standards`. In this post I will go through the kickstart creation process and Spacewalks configuration management.


Redhat Spacewalk Tutorial | Installation, RPM's, Kickstarts and Clients

Summary

Redhat's Spacewalk is a management solution to allow controlled patch deployment, maintenance of configuration files, system deployment through PXE for both virtual and bare-metal systems while also offering monitoring of system status, the automatic inventory cataloguing of registered clients and security auditing of systems all in a centralised manner. This post will go through the installation of the program as well as the set up of a repository, PXE booting and client registration.


Page Not Found :( ::-moz-selection { background: #b3d4fc; text-shadow: none; } ::selection { background: #b3d4fc; text-shadow: none; } html { padding: 30px 10px; font-size: 20px; line-height: 1.4; color: #737373; background: #f0f0f0; -webkit-text-size-adjust: 100%; -ms-text-size-adjust: 100%; } html, input { font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; } body { max-width: 500px; _width: 500px; padding: 30px 20px 50px; border: 1px solid #b3b3b3; border-radius: 4px; margin: 0 auto; box-shadow: 0 1px 10px #a7a7a7, inset 0 1px 0 #fff; background: #fcfcfc; } h1 { margin: 0 10px; font-size: 50px; text-align: center; } h1 span { color: #bbb; } h3 { margin: 1.

About Me

Hi There! This is my website to discuss / blog what I would sum up as about “stuff”. It has posts for technical information on the management of systems, to just random thoughts. To keep things tidy and sane all posts are split up into three categories, Networking and Security, Linux and Programming and Projects. This page addresses the three questions you would expect from an “about me” page, who I am, why is this here, and what I use to make and maintain this website.

Contact Me

If you want to contact me then please use the contact email address below :- <Oops not just now please> Wait thats no email address? Correct, Its my GPG public key, within that block of text my email is held, now you have three options, Import the Key Look for the fingerprint on a key server Give up as its too much effort How do I import the key?

Cookie Policy

Cookie Policy This site uses files called "cookies" to store data on your PC, cookies are used to add persistence to websites (http is stateless you know) and give me a insight on how exactly you are using this website. If you are interested you can learn more about cookies here There are two sources of cookies on this webiste Google Analytics - More Info OPT-OUT Disqus More Info The use of a script blocker / Inprivate browsing can be used to stop cookies being dropped on your machine.

Cygwin and Jekyll

Installing Cygwin + Jekyll in Windows 8.1

Just a quick one from me today, I recently got an excellent new laptop, that sadly does not seem to want to dual boot with Fedora, so I have been forced to fall back to just a Windows 8 Machine. A work colleague suggested I give Cygwin a whirl to continue to use all the amazing things Windows just can't do. During the set-up, I got extremely annoyed with the GUI based normal way of installing the environment due to me managing to break Ruby + gems and it taking longer than necessary clicking all the boxes to select the wanted applications, so I made a snippet to make the reinitialization of Cygwin in future much easier. I have moved on since this post to using Hugo instead, as ejekyll no longer works, and Hugo does!


Privacy Policy

Privacy Policy By using this website you are agreeing to the following privacy policy and consent for data sent by you / your browser to be used and analysed. This includes but is not limited to IP Address / Browser Details Usage statistics with the aid of cookies Email Address if you contact me This data is collected to aid in the development and improvement of the website as well as to facilitate the display of more relevant advertisements.

Terms And Conditions of Website Use

Terms Of use You wont try to hack me ... You have read and agreed to the Privacy policy, T&C's and Cookie Policy You accept that all information provided is provided as is, no blame lies on me if you rm -rf / All information is for educational purposes only All posts are my own opinions and not that of any company I may or may not work for All attempts at breaking the server are taken as permission for me to "

Useful Links

Useful links Here is a list of some very useful sites, in no particular order Other Blogs SecureHat - A fellow Security Blogger Adam Shore's blog - ( Tech | Security | Linux | Bike | Misc ) ramblings Ridiculously useful tech sites Nixcraft - A howto for "Everything!" HowtoForge - A friendly wiki style sollection of howtos DarkNet - A collection of useful security tools Other Sites Overclock.