Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
How To: Encrypting Mac Mail
As a security consultant, frequently traveling, it is critical to implement security controls to ...
Continue Reading
Ninja Developer Talk at Louisville Metro Infosec Conference
I recently attended, and spoke, at the Louisville Metro Infosec Conference ...
Continue Reading
DerbyCon Wrap Up
Its a wrap! DerbyCon has ended for the Secure Ideas crew and we are all headed home. While a few ...
Continue Reading
ViewState XSS: What's the Deal?
Testing |
developers |
QA |
security |
testers |
web penetration testing
As penetration testers, there are many different technologies that we have to be familiar with. The ...
Continue Reading
Testing ASP.Net WebForms: Request Method Validation
As a professional penetration tester, there are many features of an application that are similar ...
Continue Reading
How to Setup RatProxy on Windows
developers |
QA |
security |
testers
In an effort to help developers and other windows users get started adding security testing into ...
Continue Reading
How to Setup SSH on MobiSec
For most testers, MobiSec will be installed on a VM running on their testing machine, however, I ...
Continue Reading
Gone Phishing
Many organizations do not include phishing in their annual penetration tests, as they believe that ...
Continue Reading
How to install BeEF on Ubuntu 10.04 LTS
The Browser Exploitation Framework (BeEF) is a wonderful tool to have in your pen test arsenal. The ...
Continue Reading
MobiSec Live Environment DARPA Project
Mobile devices have become the most common computer technology available today, as indicated in a ...
Continue Reading
Has contents: true
Total pages: 7
Current page: 7