Andriod App Malware in Artillary Warfare

AI - Artificial Intelligence

"AI researchers grasping for grants and start-ups bounding after venture capital... engage in a bit of self-promoting hyperbole." (1)


1. "Robert Marks: What Computers Will Never Do" Brendan Dixon December 14, 2016 12:02 PM

Security coding blog tech55i - John Galbraith | A byte into Information Security

regular expression generator

Michigan, Muskegon County

NOAA Weather 162.475

151.14500 | Norton Shores Police | KTM982 RM 025 DPL NSPD Car-car Police Car-car
154.34000 | Norton Shores Fire | KTM982 RM 155 DPL NSFire Ch 2 NSFire Ch 2 / 7

155.49000 | KQA918 BM 107.2 PL MKG Co Disp County Police - Dispatch
155.70000 WNBK854 BM 151.4 PL MKG Co Car County Police - Car-to-Car FMN Law Talk
155.47500 WNQD336 BM 107.2 PL MKG Co Tac County Police - Tactical


"This antenna evolved during my search for a beam with a really great front-to-back ratio to use in hidden transmitter hunts. This design exhibits a very clean pattern and is perfect for RDF use."

Information Security Threat Detection: Applying SPACE Analysis

** work in progress **

Whether on the threat hunting team, or the monitoring and detection team, the SPACE opsec analysis tool may help. Let's see how it can apply to Information Security.

SPACE is an acronym that every good analyst should use, especially where it concerns community security. Its roots are in our operational security (OPSEC) manual, and when the adversary doesn’t care enough to implement SPACE into his security considerations, it’s our job as collectors and analyzers of information to exploit their mistakes. (1)

On the CSIRT team we are collectors and analyzers of information regarding our information systems and we need to look for, exploit, the mistakes of our adversary.

Web Security Settings

Mac OS X Security Configuration Guides

Linux Workstation and Server Security Check List - link

Linux workstation security checklist

This is a set of recommendations used by the Linux Foundation for their systems administrators. All of LF employees are remote workers and we use this set of guidelines to ensure that a sysadmin's system passes core security requirements in order to reduce the risk of it becoming an attack vector against the rest of our infrastructure.


Subscribe to CyberMick's Blog RSS