Building Metasploitable 3 on Ubuntu/Debian

Recently I attempted to build the new Rapid 7 Metasploitable 3 VM for use in my pentest lab on Ubuntu 16.10. Followed the instructions on their Github page to the letter, but failed in variety of areas. The good news is that I was able to hack my way through all them to get it … Read more

Book Review: Natural Law and the Two Kingdoms

Series: Emory University Studies in Law and Religion Publisher: Wm. B. Eerdsmans Publishing Co. Copyright: 2010 ISBN: 978-0802864437 Pages: 512 Natural Law and the Two Kingdoms can be summarized as a survey of the historically reformed Christians position on the two key concepts of the Two Kingdoms and Natural Law. Those two terms in the … Read more

Pushing The Antithesis – Part 3 – Defining Worldviews

The third part of the series has to do with as the title suggests, defining worldviews. The actual definition for what a worldview is plays a critical role in understanding the presuppositions one brings to the table for interpreting reality, knowledge, and ethics. One of the reoccurring themes you will notice through this blog series … Read more

Security Links for March 2016

Here are some new security-related (for the most part ;) links from the month of March 2016 Bitcoin Wisdom – Trading-type Terminal for Bitcoin – https://bitcoinwisdom.com/ Zone Transfer Tutorial – https://digi.ninja/projects/zonetransferme.php Debian Hardening Wiki – https://wiki.debian.org/Hardening Standard Password Manager for UNIX – https://www.passwordstore.org/ Is your Browser safe against tracking? – https://panopticlick.eff.org Have I been Pwned? … Read more

Security Links for February 2016

Made a blunder on the droplet that runs this blog on Digital Ocean and lost the previous two security link blogs. Luckily had a backup from August that I was able to restore from. Anyways, here’s the security links for February 2016. Application Security Learning Resources – https://github.com/paragonie/awesome-appsec#application-security-learning-resources A Dead Simple TCP Intercepting Proxy Tool … Read more

Educating Youth for Cyber Security Careers

This past week I attended the Northeast Ohio Cyberconsortium conference sponsored by a number of entities in the Cleveland,Oh area. The goal of the conference was to stimulate a collaborative effort around building up and sharing information around Cyber Security as it relates to the North East Ohio area. One of the main talks was … Read more

Let’s Encrypt Talk @ Debconf15

At this years Debconf15, a nice overview of the Let’s Encrypt project was given that you can view here. It’s a nice exposition as to the current broken state of CA’s and the projects plan to solve them. Let’s Encrypt is going to be making free certificates available in the next month or so. Will … Read more