Con games: How do they do it?

Hello World! So, this is going to be a fun one. Lots to cover as we jump into what social engineering is and why it works. Let us get started by listing the names that we give to these types of attacks. There are many terms used somewhat interchangeably, they include but are not limitedContinue reading “Con games: How do they do it?”

KeePass and the argument for password managers.

[Update 11th May 2022: I am going to be making changes soon to improve readability of this post, I understand it’s a little more complex than what I am aiming for.] Passwords: So, let’s start off with the most important question, what makes a good password? Passwords should be at least 14 characters in length.Continue reading “KeePass and the argument for password managers.”