Computer History: The Development of Programming Languages

Exploring ’90s computing: the rise of OOP, web development’s infancy, OS battles, transformative IDEs, and intriguing tidbits from a pivotal tech decade.

Computer History: The Role of Atari in the Home Computing Market

Exploring Atari’s pivotal role in the home computing market: from its founding to dominating the video game industry and its lasting impact on cybersecurity.

Computer History: The Birth of Gaming Consoles with the Release of the Nintendo Entertainment System

Exploring the Nintendo Entertainment System’s history, technical innovations, cybersecurity implications, and trivia in the 1980s gaming revolution.

Computer History: The Emergence of Graphical User Interfaces and Windowing Systems

Exploring the rise of GUIs in the ’90s, this piece delves into their early history, impact on cybersecurity, technical aspects, and intriguing trivia.

Computer History - The Development of CD-ROM Technology

Explore the 1990s CD-ROM technology evolution, its impact on computing, cybersecurity, intriguing technical details, and trivia in this comprehensive article.

Computer History - The Role of the Commodore 64 in the Home Computing Market

Explore the fascinating history and enduring legacy of the Commodore 64, a groundbreaking home computer that shaped the worlds of computing, gaming, and cybersecurity in the 1980s and continues to inspire today’s technology enthusiasts.

Computer History - Computing in the 1980s: The Development of the Apple Macintosh

This article delves into the history and development of the Apple Macintosh in the 1980s, exploring its technical innovations, impact on the tech industry, and relevance to cybersecurity while sharing interesting trivia and anecdotes for a technical audience.

Cybersecurity Frameworks - NIST, ISO, and CIS

In this article, we discussed the NIST Cybersecurity Framework, ISO/IEC 27001, and CIS Controls frameworks, their five, fourteen, and twenty controls respectively, and how they can be used by red teams and pen testers to enhance their security posture and protect against cyber attacks.

History - Computing in the 1990s: The Emergence of Linux and Open-Source Software

The article explores the history of open-source software and its impact on the computing industry, from the rise of Microsoft and proprietary software, to the birth of Linux and the GNU Project, the emergence of open-source software, and the mainstreaming of open-source software, highlighting key players, developments, and anecdotes, while also discussing its relevance to cybersecurity and the need for community-driven development and collaboration.

Lua Programming Language - Basic Concepts and Syntax

This article is an introduction to the Lua programming language for pen testers and red team members, covering its basic concepts and syntax, examples of its use in network analysis, password cracking, and web scraping, and weighing its pros and cons compared to other languages.