Learning Django: Key Concepts Every Beginner Should Master

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

When building sophisticated online applications, developers frequently use the well-liked Python web framework Django. Yet, learning everything about Django at

Read more

PHP vs Ruby vs Python vs Go: Comparing Popular Programming Languages for Web Development

Just your average information security researcher from Delaware US.

There are numerous programming languages to select from when creating web applications. Some of the well-known choices include PHP, Ruby,

Read more

A Beginner’s Guide to Visual Studio Code: Interface, Features, Keyboard Shortcuts and More

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

If you’re a developer or a beginner in the programming world, Visual Studio Code (VS Code) is one of the

Read more

How To Secure your Linux FiveM VPS or Dedicated Server

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

In the ever-evolving world of gaming, the quest for rock-solid and impenetrable servers is reaching fever pitch. If you’re the

Read more

Google Open-Source Vulnerability Scanning Tool

Just your average information security researcher from Delaware US.

The Open Source Vulnerability (OSV) database’s front-end interface, OSV-Scanner, was made available by Google in December 2022. The OSV database

Read more

Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]

Just your average information security researcher from Delaware US.

In this video, you will learn how to footprint firewalls on a target. This lesson comes from Module 1, so

Read more

Brute-Forcing Two-Factor Authentication | Exploiting Authentication and Access Control Mechanisms with Burp Suite [FREE COURSE CONTENT]

Just your average information security researcher from Delaware US.

In this video tutorial, you will see how to bypass multi-factor authentication with brute-force attacks. It is a part of

Read more

How to Run Threat Intelligence Analysis and Malware Research (Without Spending a Dime)

Just your average information security researcher from Delaware US.

In this post, I will walk you step-by-step through techniques that will enable you to run threat intelligence analysis and research malware

Read more

Yes, Your Home Security Cameras Can Be Hacked

Just your average information security researcher from Delaware US.

But there are ways to prevent it from happening. Here’s how. Installing an internet-connected security camera in your house won’t necessarily bring

Read more

How to request a CVE: From vulnerability discovery to disclosure

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

What is a CVE? A CVE, meaning Common Vulnerabilities and Exposure, is a publicly reported vulnerability in software products. Vulnerabilities

Read more