Skip to main content

Read This Before You Click, Tap, or Respond: Outsmarting Phishing Scams

· 4 min read
Joie Llantero
Security Engineer

Scams are getting smarter—whether through emails, texts, or phone calls. In this post, we break down how phishing, smishing, and vishing work, the warning signs to watch for, and how you can protect yourself from falling victim. Whether you're checking your inbox, reading a message, or answering a call, this guide will help you stay one step ahead.

List of Free Cybersecurity Tools and Resources

· 2 min read
Joie Llantero
Security Engineer

Cybersecurity tools can be quite expensive, and finding reliable free options is often a challenge. While free tools may not be as advanced as their paid counterparts, I believe they can still provide significant value. In this post, I've compiled a list of free tools I've discovered and tested so far, and I make an effort to keep it regularly updated.

Easily Remove the macOS Dock Hiding Animation

· 2 min read
Joie Llantero
Security Engineer

Use basic terminal commands to disable macOS dock animations and reduce wait times. Currently, macOS doesn't offer a built-in option to remove the dock hiding animation. If you have the dock hiding feature enabled, there’s a slight delay when the dock appears or disappears, which can be frustrating for some users and may cause a minor delay when opening apps.

My Experience Taking a SANS Certification: GPCS

· 5 min read
Joie Llantero
Security Engineer

The course featured a well-structured learning path, covering essential topics for anyone working with cloud resources. Attending in person allowed me to connect and network with cybersecurity professionals from around the world, including my instructor, classmates, and the SANS staff. Additionally, the course included 'live-online' participants, and all class discussions were recorded for future reference.

Deploying a CTFd Site in Azure

· 8 min read
Joie Llantero
Security Engineer

Capture-The-Flag (CTF) in Information Security is a set of challenges or scenarios where participants find the answer called "flag". For instance, one can find a flag by solving programming problems or finding them in vulnerable servers.

This article covers how we can deploy an open-source CTF platform in the cloud.

Python: Building An Offline Random Name Picker

· 6 min read
Joie Llantero
Security Engineer

When we shifted to an online setup due to the pandemic, we had so many online activities where we needed a random name picker. There are websites that offer this service but, I wanted to have a privacy-centered program that can read a large list of names and runs on my own computer. Since this is offline and we control the code, we become sure that the data stays private.

I created a program that a user can run in their terminal using Python and it can read a list of names from either a comma-separated-value (.csv) file or a text (.txt) file.

GitHub: How to Create a README with Statistics for your Profile

· 3 min read
Joie Llantero
Security Engineer

In late 2020, GitHub released a new feature which allows users to create a README file for their profiles. This file is quite useful especially in marketing yourself. You can put an introduction about yourself, your work, skills, experiences, and more. Some people also put their GitHub statistics, which I will show you how to do in this article.

The statistics that will be shown will be an overview of your GitHub account. It shall display information such as total stars, forks, repository views, languages you used, and more.