Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Proxies, Pivots, and Tunnels - Oh My!
    Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different ...
    Continue Reading
    Boolean Math (AND Logic) - CISSP Domain 3
    Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of ...
    Continue Reading
    How to configure Android (Virtual) for Mobile PenTest
    Setting up your environment for a mobile application penetration test can be a chore, especially if ...
    Continue Reading
    Game Hacking Part 1 - Equipping Your Loadout
    Why Bother with Video Game Security? Video games are more than just entertainment. Gaming is a ...
    Continue Reading
    The OPSEC of Protesting
    For the past three months thousands of people have been protesting in the United States due to the ...
    Continue Reading
    Encryption – CISSP Domain 3
    We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which ...
    Continue Reading
    Encoding – CISSP Domain 3
    Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body ...
    Continue Reading
    Summer Internship at Secure Ideas
    This past summer, I worked as an intern for Secure Ideas. My role at the company was that of ...
    Continue Reading
    Bash Tips and Tricks
    I know I definitely identify with being a visual learner, and I am happy to help where I can with ...
    Continue Reading
    Hashing Functions – CISSP Domain 3
    Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP ...
    Continue Reading
    Visual Learner? Look no further!
    Secure Ideas has been in the business for 10 years and over the last ten years we have found that ...
    Continue Reading
    Has contents: true Total pages: 38 Current page: 14

    Never miss a professionally evil update!