Incident Handler’s Journal: A List of Security Entries
This is a comprehensive Incident Handling Journal list of entries, growing with time.
This is a comprehensive Incident Handling Journal list of entries, growing with time.
Here i will be explore the intersection between rootless containers, immutable operating systems, and the open source ethos in a world increasingly defined by security and trust.
How securing my personal homelab with Linux tools and self-hosted solutions mirrors enterprise security practices.
A walkthrough of using chkrootkit to scan for hidden rootkits and ensure host system integrity.
A Python script that reads log files, detects suspicious patterns such as failed logins and access violations, and reports potential threats for security analysis.
A Python script that opens a file, reads and parses a list of IP addresses, removes unauthorized entries, and rewrites the cleaned list.
Generating and comparing file hashes to verify data integrity on Windows 11 LTSC IoT.
Analyzing default firewall exposure and implementing host-based rules to block unnecessary and risky services like SMB.
Capturing and analyzing HTTP POST traffic containing unencrypted credentials.
Capturing and analyzing a full TCP handshake using Wireshark.