Former Brigadier General Robert Spalding sits down with Cyber Security Expert Chris Robertson on Valuetainment to talk about Cybersecurity and technology.

Former Brigadier General Robert Spalding sits down with Cyber Security Expert Chris Robertson on Valuetainment to talk about Cybersecurity and technology.
NetworkChuck shows us how to install Kali Linux on Windows 10 in under 5 minutes (full tutorial) using WSL 2. (Windows Subsystem for Linux 2)
TikTok To Stop Scraping Clipboard Data, a Nationwide Bill could Ban Facial Recognition, and Nvidia Discloses Multiple Vulnerabilities.
Hak5’s latest edition of Threatwire highlights some fascinating recent developments in the security field.
A few years back, I attended a session on ethics issues around facial recognition and tips on defeating the algorithm.
Hak5 explains how to defeat facial recognition in 2020.
Null Byte explains how to Use Android & Raspberry Pi for Local Voice communications.
It can be difficult to communicate off the grid when there’s no infrastructure. That’s also true when you’re in situations where there is no cellular service or reliable Wi-Fi hotspots, such as a convoy of vehicles that want to talk to talk to each other, or protestors around the world where law enforcement cut out the cell signals.
On this episode of Cyber Weapons Lab, we’ll show how you can use a cheap $35 Raspberry Pi with PirateBox to enable Android phones to talk to each other without using any cell towers.
To learn more, check out the article: https://nulb.app/x6vtu
This time on Hak5, Glytch walks you through building your own cost effective and secure wireless cameras, as well as options for cloud-free home automation using Home Assistant.
Interested in building some yourself?
Check out his Github repo for the 3d printable models, config files and more!
The Cyber Mentor explores the how and why you should build an Active Directory Lab in this cyber-security filled tutorial video.
At the recent DEFCONConference, Nina Kollars explains her experience buying Nespresso coffee capsules.
In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online from Ebay. What followed was a series of unexpected additional packages from the manufacturer Nespresso and a lurking suspicion that something had gone terribly–if not criminally–wrong as a result of my purchase.
This talk chronicles the obnoxious amounts of obsessive research and tracking that became my new hobby–stalking Nespresso fraudsters and my decidedly non-technical attempts at developing a generic search profile and reporting the fraudsters to anyone who would listen, to include : the persons whose identities had been stolen, Nespresso, Ebay, and the FBI. Ultimately I just ended up with a LOT of coffee; a lingering sense that I had committed several crimes; and no faith left in humanity.
freeCodeCamp.org has posted a full 14 hour network penetration testing/ethical hacking in this full tutorial course for beginners.
This course teaches everything you need to know to get started with ethical hacking and penetration testing. You will learn the practical skills necessary to work in the field.
Throughout the course, you will develop your own Active Directory lab in Windows, make it vulnerable, hack it, and patch it. We’ll cover the red and blue sides. We’ll also cover some of the boring stuff like report writing :).
This course was originally live streamed weekly on Twitch and built from lessons learned in the previous week.
GitHub repo (for homework):
https://github.com/hmaverickadams/Beginner-Network-Pentesting
Course created by The Cyber Mentor.
Check out his YouTube channel:
https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw