Profile cover photo
Profile photo
Local Tech Repair
52 followers -
Computer repair, reviews, news, coding, and more
Computer repair, reviews, news, coding, and more

52 followers
About
Posts

Post has attachment
Information Security Training
Here is some training information for the cyber security analyst may need to know to be effective at monitoring the network of an organization. This is just a stripped down and formatted a little different than some of the other articles that I have written...
Information Security Training
Information Security Training
localtechrepair.blogspot.com
Add a comment...

Post has attachment
Splunk Extreme Search - xsCreateDDContext & xsWhere
Splunk has the ability to do some very impressive searches to help with statistical analysis and some of those functions are not very well documented by splunks own internal documentation. I am going to go over a few commands and how they can be used. To st...
Add a comment...

Post has attachment
How to create notable events via correlation search/manually in Splunk
One of the main things that you can do with Splunk Enterprise Security is dealing around the Incident Review dashboard. You can customize this to be the most helpful to you when doing threat hunting. One of the ways is to automate your searches to create ...
Add a comment...

Post has attachment
Ethical Hacking Bookmarks
Since Null byte group had a user get their wonderful post down and things really don't disappear from the internet after they been up here is their bookmark post of wonderful links for ethical So here is the article by author Dox Sec who looks to have dis...
Add a comment...

Post has attachment
Protecting your Android device and your Privacy
Its been a while since I have written about how to protect your self from the prying eyes of government. So if your trying to protect your self against the NSA, GCHQ, or who ever here are some things that you can do to help protect yourself. Since those 3 c...
Add a comment...

Post has attachment
Facebook Never deleted my account after years
So after over a year after deleting my #Facebook account and not signing into it.  My wife wanted me to get back on.  When I deleted my Facebook I went through all the trouble of doing it properly. So go there to create an account because we'll a year+ late...
Add a comment...

Post has attachment
Using powershell to check if password is going to expire
Using powershell to create a script to check if the clients password is going to be expiring in the next 5 days. I love powershell and just like creating random tools with it. here is a script that can be set as a task on the clients computer to run each da...
Add a comment...

Post has attachment
Penetration Test Information Gathering
After taking many classes on Advanced penetration testings i find that many of these classes are very basic when it comes to their subjects. So here are some resources to better round off your penetration testing in more depth than just the basics that most...
Add a comment...

Post has attachment
Remedy 7.x, 8.x and possibly 9.x login password decoder
So recently I have been doing some QA for a BMC Remedy product that my work is starting to work with. One thing i noticed right away is that the cipher that they use is extremely bad and basically plain text.  So here is how it works. when you go to the log...
Add a comment...

Post has attachment
College not required: A guide to starting in InfoSec
So recently I had someone tell a
community member that you needed to go to school like everyone else and pay to
learn infosec. For some reason this bugged me because I really only see college
degree as a rubber stamp for HR I would like to tell you that is ...
Add a comment...
Wait while more posts are being loaded