Photo by Brina Blum on Unsplash

As we know in the Security field, humans are the biggest vulnerabilities when it comes to Information Systems. In today’s world of social engineering and hacking, it can get easier to social engineer your way into a system, and by even by USB Drop Attacks. USB Drop Attacks are when an attacker places a script, or virus into a USB drive and then drops them near targets in hopes that some oblivious employee picks it up and connects it to a computer on a network. Once the victim connects the USB drive, it can automatically boot up if it’s a…


Photo by Kevin Horvat on Unsplash

There is a couple of ways to connect via remote access, you can use programs like Termius, Putty, Termx or you can simply SSH via Linux terminal. Regardless when using these programs, you must have the login username and password. When you first connect via Secure Shell (SSH), you will be provided a private key on your main server. Private keys are also handy when you have an account like GITHUB, which you can remotely upload to via terminal. Many employees who work for large companies, are provided with an enterprise edition of a Virtual Private Network (VPN) connection. This…


Photo by David Everett Strickler on Unsplash

A computer virus is like a human virus, it is designed to work against the computer system. A biological virus attacks the body by focusing on the organs, like the brain, lungs, and stomach. A computer virus attacks a system in a very similar way, by attacking the CPU, RAM, Hard drive, network cards, etc. Many viruses are removable, while some viruses require the hard drive to be completely wiped causing data loss. In today’s age if you are running an outdated operating system like Windows XP, then you are most likely are vulnerable to be attacked by viruses.

So…


Photo by John Schnobrich on Unsplash

When I think about this topic I think about budgets, and the value of the company. The amount of money the company puts in their infrastructure, defines their risk acceptance. A small company with five employees, may spend a small budget on their security. That doesn’t mean that large companies will open their budget freely, it is all based on if they want to approve the budget deemed necessary. A small company will have almost some or no defense at all, although many devices come with built in security like built in encryption and access controls small business can take…


A policy within a company, is a set of principles that are to be followed by employees within the company. Policy allows accountability, an example would be disciplining an employee for using someone else’s password. Although the employee who shared the password, can and could be disciplined for violating company policy as well. Policy is placed along guidelines, and standards to give a view of what is expected when it comes to security of the company data. That data can be server information, building infrastructure layout, down to the information gathered from clients. Which is why its important to have…


Photo of Albert Gonzalez by U.S. Secret Service (pre-2009)

Albert Gonzalez a hacker who gets arrested after suspiciously using multiple cards at an ATM, was arrested for his illegal activities. He was eventually hired to work for the secret service instead of being sent to prison, his salary was 75k a year to continue what he had been doing and that is to admin the website called “Shadow crew” from the dark web. This led to the arrest of a group of hackers who were illegally sending credit card information, one of the biggest cyber crime stings. After he was released by the Secret Service, he began to do…


Registry editor allows you to find, view and edit registries. When making changes you must be very careful as this an affect your full system, misconfiguration can lead to the blue screen of death. My personal experience with REGEDIT has been when I needed to modify programs, specifically those who had certain errors. Deleting the registry of some programs can be safe, and many times solves software loading issues that I have encountered in the past. One thing to note, is that you are also able to enable or disable registries that are tied to start up programs. …


An Overview of VMware and Security

VMware is a virtualization program, that allows you to run images on your host machine. Installing VMware is easy, you go to the website download and install. Once VMware is installed, we must do a full restart to finalize the installation. Before downloading it’s good to always look up your processor, and make sure it supports virtualization as you can run into some issues running VMware machines. If we look at the Virtual Machine Settings screenshot below in figure 2, we can see my most common settings for every machine. Because I have 32gb…


Photo by Claudio Schwarz on Unsplash

The Apple Operating system was designed for the average user, it was designed that you could us it more at home than at work. Its features were mostly on being creative user, we were able to see this when they dropped their system 1984 this proved that. The first Apple Operating system which was Macintosh “System 1”, the Mac was the first computer to introduce the mouse. And as the years passed Apple made updates to their operating system, from the “Kodiak”, to the “Big Sur’ and there have been technological advances over the past 4 decades. Technological advances that…

JC Nevarez

Feeding my technolust, here to follow the newest trends while working on my Bachelors in Cyber Security. #blogger #techie #retrowave #synthwavelover

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store