This week marked an anniversary that most may not have observed. On Oct 1, 1969, a small team of engineers installed IMP #2 at the Stanford Research Center and the Internet was born.
So since this whole COVID-19 thing started, I’ve had a lot of free time on my hands. Yes, I’ve suddenly become a teacher (I’m taking care of my oldest, while Liz takes care of our youngest) but I am only working at the office one week out of every three. That gives me a lot of time. I decided among other things to work on my Python (a lot). So I went back to the 2015 Advent of Code and just started going away. So here are the first five days of the 2015 Advent of Code.
I’ve always found encryption interesting. While I’m not a mathematician I understand the basics generally. That statement mostly holds true when it comes to a symmetric encryption, but not so much when we start talking about asymmetric encryption.
If you are looking for a fun way to work on your coding skills over the next 25 days or so I would encourage you to check out advent of code. This is a project run by Eric Wastle.
On Friday, I sat for the GIAC Defensible Security Architecture (GDSA) exam. The certification is brand new and is based on the SANS Sec 530 course. While I passed, it didn’t go the way I had planned
My last post about the $80K bonus for Cyber Warrants got a lot of comments on Facebook. A lot of them focused on two key things, the kind of odd restrictions built around it (as far as timelines go), and then the fact that 255S were not included in it.
LTG Fogarty, Commander of ARCYBER, signed a memo this week authorizing a $20K per year for four year bonus ($80K total) for eligible cyber warrants.
You may have noticed recently that Comcast and a number of ISPs have started to fight with Google and Mozilla after the makers of Chrome and Firefox announced that they were going to start support the use of DNS over HTTPS (DOH) and DNS Over TLS (DOT) recently
Brought to you by the same group that thought that thought that Jeff and Tina were the way to get us to be cyber aware has now released their “Identity Awareness, Protection, and Management Guide”.
Yesterday HRC released MILPER message 19-233 which announced applications for the Computer Network Operations Development Program (CNODP) class of 2023. For those of you not familiar with it, CNODP is the Army’s school for training future cyber tool developers. CNODP is comprised of the System and Network Interdisciplinary Program (SNIP), the Global Network Exploitation and Vulnerability Analyst (GNEVA) Development Program (GDP), and the Joint Cyber Development Program (JCDP).