Read about my junior black teaming experience at the 2022 Information Security Talent Search (ISTS) competition.
Read More
Read about my junior black teaming experience at the 2022 Information Security Talent Search (ISTS) competition.
Read MoreWhat to learn how to connect a MySQL database (hosted on a server) to an Angular project written in Java? Click here to learn more!
Read MoreA cheat sheet of offensive security attack types, phases, and frameworks (i.e., Mandiant). Helps find what tools to use in each attack phase.
Read MoreLearn how to create a MySQL Database for Book Inventory Management! This blog post was created for RIT’s Intro to Software Development class (SWEN 261).
Read MoreLearn how to create a Raspberry Pi server that hosts a database! Created for RIT’s SWEN 261 course for Fall 2021.
Read MoreThis is Group 2 sample Git workflow for Introduction to Software Engineering (SWEN 261).
Read MoreIn August of 2021, I began a research project–Analyzing Tactics and Developmental Trends of Open Source Malware–under Dr. Amit Ray at Rochester Institute of Technology. This article examines the results collected through analyzing publicly available malware samples, historical threats, and previous publications.
Read MoreCopy right laws ignore the implications of how copyright and restrictive creative licenses affect Americans’ safety, especially with concerns to safety, effectiveness, and innovation.
Read MoreThis post is a literature review for Rochester Institute of Technology’s Humanitarian Free and Open Source Software (HFOSS) Development class.
Read MoreThis is the third part of a three part series. Read part II here. I continued working with TigerOS for my second large contribution, so I could complete my installation guide. In other words, my second contribution is a continuation of my first contribution, so I did not need to ask for a new project. …
Read More
You must be logged in to post a comment.