Skip to content

The Security Noob.

  • Privacy Policy
  • All Interviews Are In Here!
  • [DFIR TOOLS] what are they & how to use!
The Security Noob.
  • The Security Noob Interviews Amy Moles the CEO & Co-Founder of ArcPoint Forensics
    Interviews

    The Security Noob Interviews Amy Moles the CEO & Co-Founder of ArcPoint Forensics

    ByMuldwych 18/11/202418/11/2024

    Amy Moles is the CEO & Co-Founder of ArcPoint Forensics, where Amy has been since January 2020. Prior to that, Amy gained experience in various roles at ManTech from August 2012 to September 2022. She also worked at SRA International as a Cyber Security Analyst and at the National Cyber Forensics and Training Alliance as…

    Read More The Security Noob Interviews Amy Moles the CEO & Co-Founder of ArcPoint ForensicsContinue

  • Cryptography Algorithms – Second Edition by Massimo Bertaccini (REVIEW)
    Review

    Cryptography Algorithms – Second Edition by Massimo Bertaccini (REVIEW)

    ByMuldwych 20/08/202420/08/2024

    As a digital forensics and incident response (DFIR) professional with over two decades in IT, I have always felt a bit like a “security noob” when it comes to deep cryptographic principles. So when I picked up Cryptography Algorithms – Second Edition by Massimo Bertaccini, I was hoping for something that could bridge the gap between my foundational knowledge and the increasingly complex world of cryptography. Here’s my take.

    Read More Cryptography Algorithms – Second Edition by Massimo Bertaccini (REVIEW)Continue

  • Mastering Powershell Scripting by Chris Dent (REVIEW)
    Review

    Mastering Powershell Scripting by Chris Dent (REVIEW)

    ByMuldwych 23/07/202423/07/2024

    Mastering PowerShell Scripting – Fifth Edition: Automate repetitive tasks and simplify complex administrative tasks using PowerShell by Chris Dent is an outstanding resource tailored for IT professionals, system administrators, and developers aiming to maximize the potential of PowerShell scripting. This updated edition offers a thorough exploration of the latest advancements in PowerShell, providing a deep…

    Read More Mastering Powershell Scripting by Chris Dent (REVIEW)Continue

  • The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting, Third Edition by Glen D. Singh (REVIEW)
    Review

    The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting, Third Edition by Glen D. Singh (REVIEW)

    ByMuldwych 25/06/202425/06/2024

    “The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting, Third Edition” by Glen D. Singh is an essential read for anyone serious about penetration testing and cybersecurity. As an industry staple, Kali Linux provides a robust platform for security professionals to test and secure systems, and Singh’s book offers an…

    Read More The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting, Third Edition by Glen D. Singh (REVIEW)Continue

  • The Security Noob interviews Kevin Pagano of stark4n6
    Interviews

    The Security Noob interviews Kevin Pagano of stark4n6

    ByMuldwych 03/06/202403/06/2024

    Kevin Pagano is a seasoned cybersecurity professional specializing in Digital Forensics and Incident Response. With a strong technical background and a passion for unravelling complex cyber incidents, Kevin has become a trusted expert in investigating and mitigating cyber threats. When i first started getting into DFIR and was searching for all blogs and tools to…

    Read More The Security Noob interviews Kevin Pagano of stark4n6Continue

  • Black Hat Python by Justin Seitz and Tim Arnold (REVIEW)
    Review

    Black Hat Python by Justin Seitz and Tim Arnold (REVIEW)

    ByMuldwych 21/05/202421/05/2024

    If you’re diving into the world of ethical hacking and penetration testing, “Black Hat Python: Python Programming for Hackers and Pentesters” by Justin Seitz and Tim Arnold is an essential read. Published by No Starch Press, this book is a treasure trove of practical knowledge and hands-on techniques that cater to both budding and seasoned…

    Read More Black Hat Python by Justin Seitz and Tim Arnold (REVIEW)Continue

  • Dead Simple Python Idiomatic Python for the Impatient Programmer by Jason C. McDonald (REVIEW)
    Review

    Dead Simple Python Idiomatic Python for the Impatient Programmer by Jason C. McDonald (REVIEW)

    ByMuldwych 15/02/202415/02/2024

    “Dead Simple Python: Idiomatic Python for the Impatient Programmer” by Jason C. McDonald is a gem in the realm of Python programming literature, offering a refreshing and concise approach to mastering the language for both novice and seasoned developers alike. In a landscape often cluttered with verbose technical manuals, McDonald’s book stands out for its…

    Read More Dead Simple Python Idiomatic Python for the Impatient Programmer by Jason C. McDonald (REVIEW)Continue

  • The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio (REVIEW)
    Review

    The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio (REVIEW)

    ByMuldwych 15/02/202415/02/2024

    In “The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime” by Jon DiMaggio, readers are presented with a compelling exploration of this complex landscape and are equipped with essential strategies for defence. DiMaggio adeptly opens the discussion by tracing the evolution of cyber threats, from the innocuous Yankee Doodle virus of…

    Read More The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio (REVIEW)Continue

  • Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh Trinity
    Interviews

    Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh Trinity

    ByMuldwych 22/12/202322/12/2023

    Today, I have the privilege of sitting down with a remarkable individual who I have been friends with for a while now, a former armored recon patrol commander, she has traded the battlefield for the digital frontier, wielding her skills in C# and Python to fortify systems against potential threats. But that’s not all—beyond the…

    Read More Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh TrinityContinue

  • [DFIR TOOLS] JLECmd, what is it & how to use!
    DFIR Tools

    [DFIR TOOLS] JLECmd, what is it & how to use!

    ByMuldwych 09/10/202309/10/2023

    Following on from the previous [DFIR TOOLS] posts. First lets see what JumpLists are? Jump Lists are a feature in Microsoft Windows that provide quick access to recently used files, tasks, and specific actions associated with a particular application or program. They were introduced in Windows 7 and have been present in subsequent versions of…

    Read More [DFIR TOOLS] JLECmd, what is it & how to use!Continue

Page navigation

1 2 3 … 11 Next PageNext

© 2026 The Security Noob. - WordPress Theme by Kadence WP

error: Content is protected !!
  • Facebook
  • Twitter
  • LinkedIn
  • More Networks
  • Privacy Policy
  • All Interviews Are In Here!
  • [DFIR TOOLS] what are they & how to use!
Share via
Facebook
X (Twitter)
LinkedIn
Mix
Email
Print
Copy Link
Powered by Social Snap
Copy link
CopyCopied
Powered by Social Snap