Michael T. DeWitt
Michael T. DeWitt

Pillar

March 20, 2025 The Jedi Master’s Guide to RHEL Security: May the Logs Be With You
Pillar

Once you’ve locked down the basics of RHEL security, it’s time to move into more advanced territory. These next-level techniques…

March 14, 2025 Why Your Saved Passwords Are Basically a Hacker’s Lunch Buffet
Pillar

Stealer Logs: How Attackers Extract Saved Logins from Your Browser Introduction Imagine this: You sit down at your computer, open…

January 14, 2025 Stop Logging In Like a Noob: Mastering SSH the Cool Way
Pillar

Introduction SSH (Secure Shell) is an essential tool for system administrators, developers, and cybersecurity professionals. It enables secure remote access…

September 27, 2024 The Algorithm Mafia: AI’s Secret Price-Fixing Club
Pillar

Artificial Intelligence (AI) has revolutionized business operations in ways that make the old days of “just winging it” seem downright…