Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
How to verify PGP signatures
how to verify pgp signature |
how to use pgp signature |
pgp signature check |
how to verify gpg signatures |
pgp digital signatures |
gpg signatures |
verify gpg signatures
PGP (Pretty Good Privacy) is an encryption software that is mostly known for its use in email. It is used for encrypting, decrypting, and signing emails and files. Today we’ll focus on two of its most valuable features: verification and signing. Why check PGP signatures? Signing and verifying the ...
Continue Reading
Never miss a Professionally Evil update!
Run as Admin: Executive Order on Cybersecurity
On May 12, 2021, President Biden issued an executive order on cybersecurity. This new order ...
Continue Reading
AppSec Cheat Code: Shift Left, Shift Right, Up, Down & Start
Seamless and unobtrusive security is the future. We are huge advocates of shifting left and moving ...
Continue Reading
3 Reasons to Pentest with Brave
3 Reasons to Pentest with Brave November 30, 2020 March 19, 2021 / By Ochaun Marshall Penetration ...
Continue Reading
The OPSEC of Protesting
For the past three months thousands of people have been protesting in the United States due to the ...
Continue Reading
[Update] Using Components with Known Vulnerabilities
When an organization has a breach, you would like to imagine that the attacker crafted a new ...
Continue Reading
In Case of Fire: Break Windows
When a client calls us to pentest a web application that is only available in Internet Explorer. I ...
Continue Reading
IAM Access Analyzer Review
TL;DR – This is a free tool that helps solve one of the biggest security problems when working in ...
Continue Reading
IAM Root: AWS IAM Simulator Tutorial
If you needed yet another reason to be paranoid about your personal information being exposed, the ...
Continue Reading
Taming the Jungle: Hardening your AWS infrastructure
After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort ...
Continue Reading
Welcome to the New Secureideas.com
We are excited to announce the launch of the new Secure Ideas website. It is located at the same ...
Continue Reading
Cave of Broken Mirrors: 3 Issues with AWS Cognito
Rey while searching for someone finds a distorted reflection Secure Ideas is currently working on a ...
Continue Reading