Projects from Evil USB to Radio Mapping

Infrastructure projects are completed. Projects varied from evil USB devices to mapping radio signals.

Micro-jump - Jump to Symbol

Press F4 to jump to a symbol, such as a function or a class. Supports Python, C, Go and 40 other languages.

Are you a writer or a researcher? Micro-jump also supports Markdown, F4 shows table of contents for a jump.

My micro-jump is now an official micro-editor plugin.

Social Engineering with Riku

Riku Juurikko, the social engineer

Enter guarded buildings with social engineering. Craft the email that owns the box. Connect hostile drop boxes to target networks. Bypass two factor authentication.

Luckily for us, Riku is one of the good guys. He has helped securing companies by testing their security, with their permission. Now Riku works as a senior security manager in Elisa.

Riku gave a visiting class on social engineering on my ethical hacking course. Just like last time, audince was in awe.

Want to legally and safely try hacking? Right now, Elisa and other companies offer a security

Forensic Analyses with Andrej

Get the bad guys, and help justice do its magic.

Andrej Bondarenko shows the basics of computer forensics in my Trust to Blockchain course on w18 Monday. Andjred works as the CEO of Difseco. He has extensive experience in digital forensics, and has been an expert witness in multiple court cases.

The event is open to Haaga-Helia students and staff. The presentation is in English. Limited number seats, email me from your Haaga-Helia address to reserve a place. Trust to Blockchain participants get a place automatically.

ICT Security Basics - from Trust to Blockchain - ict4hm003 2021 Spring

Learn security fundamentals to understand current trends.

Blockchains, TOR network and video conference encryption all stand on these fundamentals.

View all 2021 posts, total 19 posts.

View all 2020 posts, total 24 posts.

Visit old site 1998-2019 with 580+ posts and 3900+ comments.