by Greg Scott | Nov 29, 2024 | Cybersecurity, Who Says IT is Boring?
In mid October, 2024, a few weeks before this writing, I posted “A SYN flood DDoS attack up close and personal.” In a DDoS (Distributed Denial of Service) attack, somebody orchestrates lots of systems to flood a victim with traffic, denying internet...
by Greg Scott | Oct 15, 2024 | Cybersecurity
I had heard about different DDoS attacks, including SYN flood attacks, for a long time. In fact, I got serious about cybersecurity in November, 2000 after I found my internet-facing DNS server an unwitting part a DDoS attack against the government of Brazil. In a DDoS...
by Greg Scott | Aug 10, 2024 | Cybersecurity
DCIM\100MEDIA\DJI_0141.JPG – from Jan Wildeboer’s camera I liked what Jan Wildeboer had to say about the xz-utils and Crowdstrike incidents so much, I asked Jan’s permission to paste it as a guest blog post right here. I made one minor formatting...
by Greg Scott | Jul 1, 2024 | Cybersecurity, Slice of Life
I started using Facebook back in 2009. A few friends greeted me. It was fun. I connected with my sister, T, and her family in Idaho and we’ve traded hundreds, or maybe thousands of messages since then. T was 11 when I was born. She spent much of her teenage...
by Greg Scott | Jun 28, 2024 | Cybersecurity
Like nearly all sensational data breaches, the public will probably never know the root cause of the Great United Health Group data breach of 2024 that exposed medical information for millions and millions of Americans. But after following data breaches for a long...
by Greg Scott | Jul 9, 2023 | Cybersecurity
Back in 2019, I followed somebody on Twitter and they tried to entice me with a private message sex reference. Happens all the time – surely it’s not somebody probing to groom me – must be my masculine physique. Yeah, in my dreams. 🙂 But I answered...
Recent Comments