Skip to content

Commit c6cafe4

Browse files
committed
add new post and update about
1 parent 7f5f82c commit c6cafe4

File tree

2 files changed

+99
-10
lines changed

2 files changed

+99
-10
lines changed

content/about.md

Lines changed: 36 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,22 +9,48 @@ tags:
99
- system
1010
---
1111

12-
I am a Linux engineer by day and a coder by night. I am an ambitious problem solver with a passion for Linux (Slackware, Redhat, Ubuntu, Centos)/Unix (Solaris, AIX, OSX), development, coding and technology as a whole.
13-
I am continually evaluating and upgrading my skills so that I can stay at the cutting edge of IT by studying and taking online courses. I started to create this blog to share my passion with technology.
12+
# Unveiling the Mysteries of Technology: A Security Engineer's Tale
1413

15-
### Technology
14+
## Welcome to the Realm of Technological Wonders!
1615

17-
#### Linux and Unix Systems
16+
Hello, fellow tech adventurers! I'm excited to take you on a journey through the depths of technology, where I wear the dual hats of a Security Engineer by day and a passionate coder by night. This blog is my sanctum, a place where I unravel the dark mysteries and hidden powers of Linux/Unix systems, coding, and cybersecurity.
1817

19-
I Have worked with various Unix and Linux systems, love the platform, and philosophy on how this technology has done and involved over the years. Primary Linux Distro includes Redhat, Centos, Ubuntu, Debian, and experimented with various others.
18+
### Linux and Unix Systems: Exploring the Unknown
2019

21-
#### Code
20+
My exploration into Linux and Unix is not just a profession; it's an odyssey into the unknown. These systems, with their complex layers and philosophies, are like ancient ruins waiting to be explored. I've navigated through the labyrinths of Redhat, Centos, Ubuntu, Debian, and beyond, each distro revealing its own secrets and strengths.
2221

23-
Love to code on my spare time, its a great way to keep the mind busy.
22+
#### Delving into the Depths
2423

24+
- **Redhat and Centos**: Here, I unearthed the secrets of enterprise stability and scalability.
25+
- **Ubuntu and Debian**: These distros were like uncovering ancient scrolls, teaching me about community and user accessibility.
2526

26-
#### Web Technology
27+
### Coding: Deciphering the Cryptic Scripts
2728

28-
The web has given us so much. I believe it should still be open and free—that why we need to help opensource projects to ensure its freedom and assessability for all
29+
When the sun sets, my coding saga begins. Each line of code is a cryptic script waiting to be deciphered, a puzzle demanding to be solved. My night is spent in this mystical world of algorithms and logic, where I unlock the true potential and power of technology.
2930

30-
![NixBytes Repo](https://github.com/Nixbytes)
31+
#### My Nightly Ritual
32+
33+
- **Challenging Projects**: From creating intricate algorithms to contributing to arcane open-source projects, every code is a key to a new mystery.
34+
- **Continuous Learning**: Like a sorcerer honing his spells, I continually sharpen my coding skills through online courses and relentless practice.
35+
36+
### Web Technology: Weaving Magic in the Digital Realm
37+
38+
In the domain of web technology, I'm a wizard weaving spells of creativity and security. Building websites, understanding the enigmas of web protocols, and experimenting with avant-garde frameworks are part of my quest to master this art.
39+
40+
#### Crafting and Securing Digital Experiences
41+
42+
- **Secured Creation**: Integrating impenetrable security into web development is my forte.
43+
- **Design Alchemy**: Balancing functionality with enchanting design is a magical challenge I thrive on.
44+
45+
### Cybersecurity: The Guardian of Digital Secrets
46+
47+
My foray into cybersecurity is a vigil in the shadows, guarding against unseen threats. I delve deep into the systems, unraveling their secrets, ensuring that they stand impervious to the lurking dangers of the digital world.
48+
49+
#### My Creed
50+
51+
- **Unearthing Vulnerabilities**: Like a detective in the night, I proactively seek out weaknesses before they can be exploited.
52+
- **Spreading Wisdom**: Sharing my knowledge of cybersecurity is akin to teaching the art of ancient defense.
53+
54+
### Conclusion: Join Me in this Enigmatic Journey
55+
56+
This blog is more than a collection of technological tales; it's a beacon for those who seek to explore the uncharted territories of IT. Whether you're a kindred spirit in coding, a seeker of Linux/Unix knowledge, or a fellow guardian in cybersecurity, I invite you to join me. Together, let's uncover the arcane powers and hidden mysteries of technology. Join me on this spellbinding adventure into the heart of the digital world!
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: "Exploring Sysinternals Tools"
3+
date: 2023-12-17
4+
draft: true
5+
---
6+
7+
# Exploring Sysinternals Tools: Sigcheck, Streams, and SDelete
8+
9+
## Introduction to Sysinternals Tools
10+
11+
Sysinternals provides a suite of tools for Windows system administration and troubleshooting. We'll focus on three notable tools: Sigcheck, Streams, and SDelete, highlighting their importance in cybersecurity.
12+
13+
## The Significance of Windows in Cybersecurity
14+
15+
Despite various opinions about Windows as a platform, its widespread use makes it a critical focus in cybersecurity. Understanding Windows is essential because:
16+
17+
- **Prevalence**: Windows is widely used in businesses and homes, making it a frequent target for cyber threats.
18+
- **Complexity**: Its complexity and variability mean that vulnerabilities can often go unnoticed.
19+
- **Interconnectivity**: Windows systems are often part of larger networks, where one compromised machine can lead to broader security breaches.
20+
21+
Learning to manage and secure Windows systems is thus crucial for a robust cybersecurity strategy.
22+
23+
### Sigcheck: Ensuring File Integrity
24+
25+
**Sigcheck** is a command-line utility that provides file version, timestamp, and digital signature details. It can check a file's status on VirusTotal, helping identify potentially harmful files in Windows environments.
26+
27+
#### Use Case: Verifying Windows System Files
28+
29+
For example, using Sigcheck to check for unsigned files in `C:\Windows\System32` is vital for maintaining system integrity.
30+
31+
#### Key Parameters:
32+
33+
- `-u`: Show files unknown by VirusTotal or with non-zero detection.
34+
- `-e`: Scan executable images only.
35+
36+
![Sigcheck Execution](image-sigcheck-execution.jpg)
37+
38+
### Streams: Managing Alternate Data Streams
39+
40+
**Streams** addresses Alternate Data Streams (ADS) in NTFS, allowing for multiple data streams within a file.
41+
42+
#### Example: Security Implications of Downloads
43+
44+
Internet-downloaded files receive an ADS identifier, impacting their security handling in Windows. Knowing how to view and manage these streams is key in cybersecurity.
45+
46+
![Streams Execution](image-streams-execution.jpg)
47+
48+
### SDelete: Secure Data Erasure
49+
50+
**SDelete** is vital for securely deleting files or cleansing free space, using standards like the DOD 5220.22-M for data wiping.
51+
52+
#### Cybersecurity Aspect
53+
54+
It's used in data destruction and file deletion techniques, making understanding its usage crucial in both offensive and defensive cybersecurity strategies.
55+
56+
![SDelete Implementation](image-sdelete-implementation.jpg)
57+
58+
### Conclusion: Embracing Windows in Cybersecurity
59+
60+
Despite its criticisms, Windows remains a cornerstone in the cybersecurity landscape. Tools like Sigcheck, Streams, and SDelete are essential for maintaining security and integrity in Windows environments. By mastering these tools, cybersecurity professionals can better defend against the myriad of threats targeting Windows systems.
61+
62+
Continue your exploration of Windows-centric cybersecurity tools at the [Sysinternals File and Disk Utilities page](https://docs.microsoft.com/en-us/sysinternals/downloads/file-and-disk-utilities).
63+

0 commit comments

Comments
 (0)