MattCASmith
Blog posts
Blog index
Feed
ALL
CYBER SECURITY
TECHNOLOGY
PROGRAMMING
DESIGN
OFF-TOPIC
2024-07-20
Endpoint detection and response (EDR) - setting the record straight
2023-11-26
Centralisation, repeatability, and automation in a modular SOC
2023-03-26
Cyber security sometimes means learning things backwards
2023-02-17
Using winget to automate software deployment to a new laptop
2022-12-14
Investigating Explorer's temporary ZIP folders and retrieving files
2022-12-03
Parsing login sessions from the Windows event log with PowerShell
2022-08-21
Using Tkinter to build simple GUIs for Python apps
2022-02-22
Linux .bash_history: Basics, behaviours, and forensics
2022-01-08
SANS Holiday Hack Challenge 2021: Slot machine walkthrough
2022-01-08
SANS Holiday Hack Challenge 2021: Yara rule analysis walkthrough
2021-05-03
Backutil development: Implementing multiprocessing in Python
2021-05-01
Installing Splunk Free in a virtual machine for log analysis
2021-04-02
File carving: Recovering a deleted file from a Windows disk image
2021-03-26
Backutil development: Building and JOINing SQLite databases in Python
2021-01-01
Introducing Backutil: A Python‐based Windows backup utility
2020-12-22
The best cyber security and technology books I read during 2020
2020-11-20
AWS: Deploying and connecting to a SQL database in the cloud
2020-11-15
AWS: Deploying a virtual network and server in the cloud
2020-09-12
Cracking a password-protected ZIP file with fcrackzip
2020-09-02
Network connections and packet crafting on the Linux command line
2020-07-18
Technicolor TG582n router: The missing event logging manual
2020-07-04
Welcome to a new website with a new philosophy
2020-05-02
Why virtual cyber security conferences should be the new normal
2020-03-28
SANS FOR508: I’m now a GIAC Certified Forensic Analyst
2020-02-15
Setting up Pi-hole to rein in an extremely noisy Samsung Smart TV
2020-02-02
Long-form – HTTPS and VPNs: How private is your internet browsing?
2019-11-30
Update: Cyber security projects, another trip to Japan, and plans for 2020
2019-08-26
Update: I’m back, and Def Con has inspired me to get hacking
2019-04-21
The Twitch streamer who wastes tech support scammers’ time
2019-04-14
Python tools for Windows forensics: Mozilla Firefox browsing history
2019-04-07
Investigating external network connections with netstat and OSINT
2019-03-29
The challenges and benefits of quitting Facebook and other social networks
2019-03-22
Six lessons in strategy, management and teamwork from F1 boss Ross Brawn
2019-03-15
Python tools for Windows forensics: Microsoft Office recent files
2019-03-09
Raspberry Pi Home Hub: Building and sending a daily email briefing
2019-03-01
An introduction to the Agile project management framework
2019-02-15
Python tools for Windows forensics: Extracting a user’s Google Chrome history
2019-02-08
Raspberry Pi Home Hub: Building the news and weather screen
2019-02-01
SQL ALTER TABLE: Adding, modifying, and dropping columns in a SQL table
2019-01-18
Python tools for Windows forensics: Windows Security event log
2019-01-11
Raspberry Pi Home Hub: Project intro, requirements and objectives
2019-01-04
How to approach your morning routine like a software developer
2018-12-21
SQL JOINs: INNER JOIN, LEFT JOIN, RIGHT JOIN and FULL OUTER JOIN
2018-12-15
Python tools for Windows forensics: Deleted files in the Recycle Bin
2018-12-08
Cyber skills gap: Raising awareness of cyber security opportunities
2018-11-23
Python tools for Windows forensics: Parsing Prefetch program data
2018-11-03
Review – Threat Modeling: Designing for Security by Adam Shostack
2018-10-19
SANS FOR500: I’m now a GIAC Certified Forensic Examiner
2018-10-12
Basic SQL queries: SELECT, FROM, WHERE and other operators
2018-10-05
Liverpool will win the Premier League, according to my Python predictor
2018-09-22
Approaching incident response on the front foot with the HARM method
2018-09-14
Visualising connected hosts with a Python-generated network diagram
2018-09-07
Seven things I’ve learnt in my first year as a cyber security consultant
2018-08-24
A Python script to make sense of multi-dimensional Splunk exports
2018-08-10
Review – InfoSec Rock Star: Because Geek Will Only Get You So Far
2018-07-22
Security log analysis: How to group by two fields in Splunk
2018-06-23
How passwords work – a simple demonstration in Python
2018-06-09
The Social Network: A film that passed me by for eight years
2018-06-01
What a security operations centre (SOC) is and how it works
2018-05-13
Checking DNS requests against a domain blacklist in Python
2018-04-29
Automatically generating SOC emails with a Python script
2018-04-08
Incident triage: Identifying the source of a malware infection
2018-02-23
I’ve arrived in the wearable future (but time is running out)
2018-01-20
What cyber security courses don’t prepare you for
2017-12-18
Grabbing domains and URLs from tcpdump data using Python
2017-11-30
Creating beautiful graphs in Python with Plotly
2017-11-26
The day Instagram advertising read my mind
2017-11-24
Fetching and filtering tweets in Python with Tweepy
2017-11-18
Three of the best cyber security podcasts around
2017-11-11
Update: I now work in cyber security
2017-04-03
Rick Sanchez explains command injection
2017-03-27
Finishing line: I’ve passed my GCIH exam!
2017-03-24
Automating a brute force web attack
2017-03-18
How I became a Linux person
2017-03-09
Flaws are more troubling than surveillance
2017-02-24
Halfway point: I’m now GSEC certified!
2017-02-09
Hackers look just like you and me
2017-02-03
Yes, your OS needs anti-virus software
2017-01-09
CES’s gadgets create new data to be stolen
2017-01-06
2017: New challenges for a new year
2016-02-07
Talking cyber security on Chicago radio