Author: NorStar
-
Phoenix Data CS Risk Framework
Phoenix Data CS Risk Framework Phoenix Data CS Risk Framework August 14, 2024 This post outlines the Phoenix Data CS Risk Framework (current version Beta 1.2). It addresses data assessment, data classification, and data scoring against the CIA Triad to determine data risk. The aim of the project is to provide a streamlined framework for…
-
Using Keycloak as an IAM Provider for WordPress
Using Keycloak as an IAM for WordPress Using Keycloak as an IAM for WordPress August 9, 2024 This tutorial walks you through setting up Keycloak as an IAM for one or more WordPress sites. Before You Implement This in Production I have only done this in a development environment and this setup is likely lacking…
-
Vanilla Bare Metal Keycloak Install for Linux in Dev Mode
Vanilla Bare Metal Keycloak Install -Linux Vanilla Bare Metal Keycloak Install -Linux August 9, 2024 This is the the bare metal plain vanilla keycloak install on Linux. I used an Ubuntu like machine, however it should work on any distro. This tutorial follows the directions in the official docs which can be found here: https://www.keycloak.org/getting-started/getting-started-zip.…
-

ICMP Flood DoS Attack Explained
ICMP Flood DoS Attack Explained ICMP Flood DoS Attack Explained August 6, 2024 What is an ICMP Flood DoS Attack? ICMP stands for Internet Control Message Protocol and serves as a means to troubleshoot network issues, network diagnostics, and so forth. When one computer sends an ICMP echo-request to another computer, the receiving computer responds…
-
SYN Flood DoS Attack Explained
SYN Flood DoS Attack Explained SYN Flood DoS Attack Explained August 6, 2024 What is a SYN Flood DoS Attack? When two devices first create a TCP connection via the TCP three way handshake, the client machine sends what is called a SYN request to the server. The server then responds with a SYN/ACK and…
-
Intro to Virtual Machines
Intro to Virtual Machines Intro to Virtual Machines August 5, 2024 In this extremely short article on virtual machines we cover what a a virtual machine is and what a hypervisor is. We briefly go over different types of virtual machines, etc. Let’s dive! What is a Virtual Machine? Virtual machines are virtual computers that…
-
Exploring a WordFence Activity Report
Exploring a WordFence Activity Report Exploring a WordFence Activity Report August 5, 2024 WordFence is a well known security solution for WordPress websites. It is packed with security features including the wordfence web application firewall, website hardening capabilities, monitoring, logging, bruteforce prevention, 2FA etc. One of its features is its ability to send weekly and…
-
Installing VirtualBox on Debian Based Systems
Installing VirtualBox on Debian Based Systems Installing VirtualBox on Debian Based Systems August 3, 2024 Virtualbox runs as a hypervisor on top of your host operating system, enabling you to create virtual machines on top of your host machine. In this tutorial I go through installing virtualbox on Debian based systems. This tutorial assumes you…
-
Installing Vendure Locally on Bare Metal in Dev Mode
Installing Vendure Locally on Bare Metal in Dev Mode Installing Vendure Locally on Bare Metal in Dev Mode July 20, 2024 Vendure is a headless open source ecommerce and marketplace solution for running online marketplaces such as etsy, amazon, etc. or for simply running a simple online store like you would with woocommerce. As it…
-
Binary Search Algorithm
Binary Search Algorithm Binary Search Algorithm July 18, 2024 The Binary Search Algorithm takes a set of pre-organized data, such as an array of numbers like {1, 2, 3, 4, 5, 6, 11, 13, 199, 201,} and divides the set by two, then takes the middle number and compares it to the target number, if…
