
Secure or Scam? How to Spot Social Engineering Attacks
In this post touch on Social Engineering and provide briefly some examples. In accordance to Domain 1 of the Comptia Security+ exam.

My Cyber Attack Experience: A Lesson in Response
In this post I talk about one of my first Cyber attack experiences and how I responded. I also list some common attack methods of threat actors.

Defense 101: Configuring a Firewall with UFW
In this post we get a feel for Oracle Cloud with a Ubuntu Linux instance by configuring a Firewall using UFW.