Profile avatar
jamieelise.bsky.social
Cybersecurity novice sharing their education and professional development journey. Veteran. Avid fishkeeper 🎏
11 posts 487 followers 1,783 following
Regular Contributor

Boston considering its traditional methods of protest against tyranny at @teslatakedown.com this morning #TeslaTakedown

EXCLUSIVE: Defense Secretary Pete Hegseth last week ordered U.S. Cyber Command to stand down from all planning against Russia, including offensive digital actions. On @therecordmedia.bsky.social therecord.media/hegseth-orde...

Freddie Mercury didn't go into the studio and nail the vocals for "The Show Must Go On" in one take while dying of AIDS for you to despair and give up now. Take the time you need, but then get up and get back out there. The show must go on.

Important learning!

zero day is a fake holiday invented by Big Cyber to sell more cyber

"That sign can't stop me because I can't read" as political theory

Digging this cover art!

LOL

DHS has terminated the memberships of everyone on its advisory committees. This includes several cyber committees, like CISA's advisory panel and the Cyber Safety Review Board, which was investigating Salt Typhoon. That review is "dead," person familiar says. www.documentcloud.org/documents/25...

Post-apocalypse show pausing for the apocalypse

Finally wrapped up Tryhackme’s 2024 Advent of Cyber last night. It was fun! I definitely recommend it. I really appreciate the wide swath it cut across the Cybersecurity field.

Digital Rights Bytes is your one-stop-shop to learning the how and why to some of your common tech questions 🤖

How to pick up girls.

A network protocol stack is a hierarchy of layered protocols that collaboratively manage communication between devices, handling tasks from application-level interactions to physical data transmission over a network 😎👇 #sysadmin #devops #infosec #cybersecurity

happy black friday everyone

😏

What a gold mine! 😍

Signal alone is not enough. If you are an activist, you need a complete self-defense against surveillance. @eff.org has been maintaining these resources for years: ssd.eff.org

True zen

There is more than just congress on the hill… staffers, journalists, and constituents petitioning congress. And transgender military members for the few months that they can continue to serve. It is more than performance art. Half of the Capitol has shut itself off from transgender Americans.

Are all the bugs really gone? How should you approach an application if you're done with recon? Here are my top 5 tips for approaching the main program and finding bugs #bugbountytip #BugBounty 1/7

Malicious QR Codes: How big of a problem is it, really? https://buff.ly/3OoDeAl

10 SIMPLE Python Projects for your Cybersecurity Portfolio: 1. Network bandwidth monitor 2. Password strength checker 3. Firewall rule generator 4. SSH key generator 5. Web app scanner 6. Hash calculator 7. Traffic analyzer 8. Port scanner 9. Report emailer 10. SSL cert checker