Wojtek Brejnak 

95 Followers
173 Following
152 Posts

Hello. I'm Wojtek. I want to transition to cybersecurity. Currently running my own my business not IT related. I'm fresh CompTIA A+ certified. Studying for Net+ and Sec+. 1% TryHackMe. I'm calm and kind person. Willing to help anyone who needs it. You can always DM me about anything.

#cybersecurity #itsecurity #cybersec #hacking #informationsecurity #compTIA #hacker #knowledge #MessageToTheWorld #LifeTimeLearner #learning #kindness #TryHackMe

twittertwitter.com/wojtekbrejnak

Who is the main Transformers' villain? Optimus Crime.

#jokes #transformers #funny #stupid

"Web dev is like solving the same problem but with an endless amount of tools.
Software dev is like solving an endless amount of problems with the same tool."

credit: some reddit user

Do you agree?

#programming #SoftwareDevelopment #webdev #codinglife

"#HTML is the skeleton
#CSS is the skin
#javascript is the brain

Without skeleton, you can do nothing.
Without skin, you'll look ugly.
Without brain, your body won't function."

Great comparison, worth sharing, I think.

credit: user Darren Mistry on Quora
#programming #FrontEnd

NordVPN Meshnet is now #opensource and #free for everyone. Great news, great move. Big thing. But how secure it really is at this moment compared to #openvpn or other solutions? At this moment I know to little about it to have any opinion but please share some of your thoughts.
πŸ§‘β€πŸ’» #ux

Excited to begin this blog series: So you want to be a SOC Analyst?

This post is just the intro to the series, but it outlines what I plan to roll out over the next few weeks as a resource for anyone that wants to take a fast path to gaining real-world skills needed by an entry-level SOC analyst.

If this interests you or someone you know, subscribe for updates as the series unfolds.

#infosec #soc #detection

So you want to be a SOC Analyst? Intro

A blog series for someone wanting to get a start as a SOC Analyst

Eric’s Substack

Quick and easy way to swap two variables values without using third variable.

a=a+b
b=a-b
a=a-b

#programming #tips #coding

Did you think I forgot? Nope. Day 3 of the 28-Day #GetHiredChallenge went live earlier this morning. In this video we're asking the question "Is a Lack of Diversity a Security Risk?". Check it out!!

#infosec #GetFediHired

https://www.youtube.com/watch?v=vlz7LHevUAU

Episode 3: Is a Lack of Diversity a Security Risk

YouTube
Want to detect Cobalt Strike on the network? Look to process memory https://ift.tt/qneQgtj
Want to detect Cobalt Strike on the network? Look to process memory

Security analysts have tools to spot hard-to-find threat, Unit 42 says

The Register

Fun, weird, infosec-sailing crossover facts that combine my work with my play:

The term 'log' as we use it to refer to a record of events, is actually a nautical term. Back in the day, boat speed was measured by throwing a piece of log over the front of the ship and measuring the time it took for the boat to cruise past the log. The time it took to pass the log was recorded in a 'log book', which gave an account of the relative speed of the vessel over time, and would help with navigation.

The method was improved with time, but for a few centuries this was the standard way of doing things, and is why we use a quite strange word to record the timestamps for authentication attempts, crashes, and other system events today.