top of page


Find out who the customer is and make them happy
Help other people succeed
Be a problem solver
Search


Cryptography Chart
Encryption turns plaintext into ciphertext Steganography hides information within other information Perfect Forward Secrecy Random...
Jeff
Sep 1, 20211 min read
15 views
0 comments


Group vs Role based access / security
Although often used interchangeably, there are technical differences between Groups and Roles. Here is my attempt at charting those...
Jeff
Aug 28, 20211 min read
13 views
1 comment


X.509 Certificates Quick Reference
PEM Formats contain: BEGIN CERTIFICATE—- and —-END CERTIFICATE—- statements. The private key is contained between the —- BEGIN RSA...
Jeff
Aug 26, 20211 min read
15 views
0 comments


Security+ Study Material
OSI Model A = Authenticate / Address / Access B = Border C = Contol(er) / Code D = Domain / Device / Datagram / Document / Directory E...
Jeff
Aug 25, 20213 min read
10 views
0 comments


How Safe Is Your Health Care Data?
How safe if your health care data? If you don't know the answer to that question, you really should find out. Since the rise of COVID19,...
Jeff
Aug 25, 20212 min read
2 views
0 comments


Can I Have Your Bank Password Please?
I said please, just like my mother taught me to do. Regardless, most sane people would at least say no. People may even wonder about my...
Jeff
Aug 25, 20213 min read
2 views
0 comments


The (Virtual) Keys to Your House
There are few things that we protect more than our keys. I can tell you exactly where my house, car, safe, office, and club keys are at...
Jeff
Aug 25, 20212 min read
7 views
0 comments
Recent Posts
bottom of page