Justin

15 Results / Page 1 of 2

Background
Woman standing in front of a projected image of data.

today7 September 2024

  • 67
close

Machine Learning Justin

Machine Learning Concepts – Part 2 – Problem Definition and Data Collection

This entry is part 2 of 2 in the series Machine Learning Concepts

  In part 1 of this Machine Learning Concepts series of posts I provided an introduction to the necessary steps to deploy a machine learning model. Check that out if you missed it. Now that we understand the requirements for deploying machine learning models we need to begin by defining ...

Photo by Mikhail Nilov:

today1 September 2024

  • 57
close

Penetration Testing Justin

SSH “Wide-Compatibility Mode” in Kali Linux

I am in the process of taking the Practical Junior Penetration Tester (PJPT) course from TCM Security and immediately started experiencing problems as I was following the course material. One such issue actually prevented me from utilizing SSH to its full capacity. As of Kali Linux 2022.1, it’s possible to ...

Gears

today25 August 2024

  • 15
  • 1
close

Machine Learning Justin

Machine Learning Concepts – Part 1 – Deployment Introduction

This entry is part 1 of 2 in the series Machine Learning Concepts

  Machine Learning models are key to the continued improvement of artificial intelligence. This article is the first in a series of articles that I’ll be publishing introducing reads to various Machine Learning concepts. First up, we introduce some typical steps involved in producing a machine learning model. 1. Problem ...

Microsoft Excel computer desktop image.

today3 August 2024

  • 6
close

General Justin

Displaying Exchange Rates in Microsoft Excel Desktop

In typical Microsoft fashion, the online version of Excel offers the native capability to add currency exchange rates in your Excel spreadsheets. It’s a little trickier in the desktop version of Excel, but I found the following to the best solution. It uses publicly available data from x-rates. Locate the ...

Photo by Pixabay: https://www.pexels.com/photo/close-up-of-figurine-326616/

today17 February 2024

  • 382
close

Application Security Justin

A Guide to Public Key Authentication Using SSH

The SSH (Secure Shell) protocol allows an ability to remotely, and securely, access hosts. SSH has various options for authenticating to a host including — password authentication, public-key authentication, and host-based authentication. Before we get into all of that, let’s generate an SSH keypair. Generating an SSH Keypair Most Linux ...

Photo by Josh Sorenson: https://www.pexels.com/photo/ethernet-cables-plugged-on-a-server-rack-1054397/

today31 January 2024

  • 32
close

General Justin

Windows Server Evaluation ISOs

I was building out a new malware lab recently and wanted to include an Active Directory server. Microsoft doesn’t make it super easy to navigate their downloads, so here are URLs for all Windows Server evaluation ISOs from Windows 2012. Windows 2012 R2 Essentials Windows 2012 R2 Windows 2016 Windows ...

today22 July 2023

  • 372
close

Security Operations + Open Source Intelligence Justin

An Introduction To Automating Open Source Intelligence Gathering Using Spiderfoot

SpiderFoot is a Open Source Intelligence (OSINT) tool that combines the power of many Internet API’s to gather intelligence on Names, E-mail Addresses, Domains, IP Addresses, and more.  This article will help you get setup with a local installation of SpiderFoot using Docker, guide you through the initial setup and ...