I spent the better part of 2017 using Ubuntu on my primary desktop at home and it was, for the most part, a good experience. I was relieved to be off of Windows if only to help mitigate the risk of losing my data to ransomware, especially while I was scrambling to find a new backup solution after CrashPlan decided to screw over users. On top of that, I was excited to be trying something new and to work through some of the challenges that would come from using a dramatically different OS. Due to some of my favorite applications not being available on Linux, such as Microsoft Office and Adobe’s Creative Cloud, I would have to rethink how I went about using these applications.Continue reading “The Ubuntu Experience”
I had, in the past, made attempts to leave Windows behind as I moved into the world of Linux. Each of those attempts lasted no longer than a week or two before I found myself popping in a Windows 7 DVD into my computer to return to a familiar place. Knowing this, I was determined to not return to Windows. Where before my motivation at first was me wanting to be one of the “cool Linux guys”, this time around it was my frustration with the direction Microsoft was taking Windows was my driving force.Continue reading “Ubuntu! I Choose You!”
I still remember my first reaction to installing the Windows 8 beta when it was first released in early 2012. Upon seeing the lack of a Start Menu and no File Explorer shell I panicked and uninstalled the beta and installed Fedora Linux. After about two weeks of using Fedora I realized that too much of what I did on my computer relied on applications like the Adobe Creative Suite and Microsoft Office (not to mention gaming on Steam) and Fedora was not compatible with any of it. It was at this time I decided I’d have a new rule when trying something out: use it for two weeks before forming an opinion.
Continue reading “Microsoft Windows: A Love Story”
Today I completed the WordPress: Building Child Themes course on Lynda.com. This course, which I found to be very enlightening, was taught by Morten Rand-Hendriksen. One of the prerequisites for starting this course was to have a local WordPress installation running on your machine. To achieve this, I turned to the Bitnami WAMP stack to install a development web server on my PC. From there I was able to download the WordPress add-on Bitnami created for their WAMP stack and within minutes I was up-and-running.
Continue reading “WordPress: Building Child Themes”
I started taking the WordPress Essential Training course taught by Morten Rand-Hendriksen on Lynda.com. I have to admit that I found this course hard to get through given the years of experience I already have using WordPress. I powered through it in the hopes of learning something new but, overall, it was five hours of review.
Continue reading “WordPress Essential Training”
I started the day off by taking one of this learning path’s shorter classes called Up and Running with Git and GitHub. This course was taught by Ray Villalobos and, while only weighing in at 1hr 21min, it was definitely one of the courses I utilized almost immediately. I finished the course, had some breakfast, then clocked into work and started using Git to track the changes I made to the website I’m working on. After using it for a few hours I begin to wonder how on earth I got by without it for all these years!
Continue reading “Up and Running with Git and GitHub”
I’m taking a quick break with my Front-End Web Developer learning path on Lynda.com to deal with a problem I’ve been putting off. Over the past two or so years, I’ve been paranoid about the possibility of my computer getting infected by a ransomware such as CryptoLocker. I’m ashamed to say that I’ve been living on the edge over the past few years with no real backup solution in place. This places me in the most dangerous situation where the threat of CryptoLocker is at its greatest: without a backup of my data I would have to pay a ransom of $300 to regain access to it.
Continue reading “CrashPlan: Developing a Backup Strategy”
Today’s videos were an overview of tools Kali provides for cracking passwords. This subject was broken into two videos, one each for offline and online attacks. So far as choosing an offline attack vs an online attack, the instructors suggested that an offline attack is better in that one has a lot more time to crack whatever password they’re trying to access. Online attacks in which one is actively engaging a target are risky in that you stand a chance at being detected or triggering a system policy which may halt your attack. They reiterated that these rules weren’t set in stone, however, and one should proceed as one judges best.
Continue reading “Kali Linux: Cracking Passwords”
I made it through two videos today each an overview for the tools associated with enumeration and the other on the techniques of gaining access to a system. Because of the nature of these two videos, I don’t have too much to say on the subjects yet as they weren’t really hands on.
Continue reading “Kali Linux: Enumeration and Gaining Access”
Today’s video was pretty straightforward and the thirty minutes went by faster than I realized. Given how little was covered in this video and how late it is in the day, this is going to be a very short post. The focus of today was on looking for systems that are live on a network. Scanning for these live hosts are a big part of the penetration process that helps one discover what ports are open and what lies beyond them. Kali has a variety of tools to help determine what is actually live, but one of the obstacles we’re bound to run into are systems that aren’t live all the time. When we perform our scans, these systems may be offline which is something we have to take into consideration. The instructors also mentioned scenarios where machines may be offline but have the Wake on LAN feature turned on. Apparently there are tools in Kali to help us in these situations as well.
Continue reading “Kali Linux: Checking for Live Systems”