Does that link go to a memory dump? If so.. that’s cheating and against the ISC2 agreement. Creating or using memory dumps doesn’t demonstrate competency and weakens the credibility of the cert for legitimate passers.
Ahh man you put me in the scene with that photo. I can smell the fresh morning. Thanks 😊
From the opposite side of the pond it seems! Cheers internet stranger, a pint to coolness 🍻 (plus an ocean of 🐠 for the fur babies)
Hey All,
I could use some help in identifying a good set of cameras to use for monitoring and securing job sites for a contractor client of ours.
They are set up on Ubiquiti Protect for their own facilities, but we're interested in something that can be a bit more cloud-based (or at least not dependent on our own sites). We'd like these abilities:
- Ability to share a URL on a camera-by-camera basis to clients can see their job progress live
- 24x7 recording
- Decent storage history (7-30 days is probably fine)
- Online storage to protect against jobsite camera theft
- infrared for night use
We're open to both cellular and non-cellular connectivity. Features like person detection and such are nice-to-haves rather than must-haves.
Any thoughts on something that's worked well for you?
Thanks, Siravious
Haha this is brilliant
Welp… this isn’t very strategically sound. Within the same service, they want to motivate me to consolidate shipping to Amazon delivery day or no rush. Guess who’s not using those methods anymore? Fuck you amazon, gonna cost you multiples of that $3 in shipping you greedy fucks.
Tresorit for encrypting and sharing. Beats Proton Drive.
It would seem best to understand both offensive and defensive aspects of security, which, of course, is based on the fundamentals. There are no shortcuts to download a tool and become anything in Cybersecurity space because people who understand the fundamentals can easily counter most “amateur” attacks.
For example, if I hire somebody interested in a certain type of security position, my first question will always be the opposite… If you want to attack X, how would you defend it? and then how would you circumvent that defense, etc.
I am a former enterprise architect in the cybersecurity space as well as a former director of cybersecurity operations and now own a cybersecurity consultancy.
My best advice is to ignore the tools for now. Understand the concepts of cybersecurity across all domains you can - from endpoint protection to privileged access management.
You can pick up a lot of this during the prep for certifications like CompTIA’s or CISSP.
Then whatever you find yourself most passionate about, find an entry level job in that discipline and that can be a way of starting “real world” exposure to the rest.
I hope this helps in some way, and best of luck!
Great pic. And welcome!