Member Post – Eddie Onsare – The Vulnerabilities of Two-Factor Authentication
Eddie Onsare, a student at East Carolina University, has written his term paper on ‘The Vulnerabilities of Two-Factor Authentication.’

Timothy Meadows presents Internet Safety
This presentation was created for my elementary computer class. It is also my first time recording and sharing content. I hope that it was enjoyable and is helpful for talking with those with younger people in your life. Contact via LinkedIn http://linkedin.com/in/timothy-meadows Video references https://jr.brainpop.com/ BIO Timothy Meadows has been working in technology with the…

Google Dorking (Google Hacking) – A Form of Passive Recon
Title: Google Dorking By: Christy Long Kushner Year: 2018 Google Dorking Overview Google Dorking (Google Hacking) is a form of passive reconnaissance allowing you the White Hat tester to use search strings, operators, Boolean, regular expression (Reg-Ex) to search files, websites to find information that is not readily available with a generic Google search. Disclaimer…

MAC Addresses for the beginner written by Christy Kushner
Follow along with the presentation using this worksheet.

How to Get into Infosec: InfoSec Career Path Hacking By Aaron Lancaster
Read the full article at https://www.alienvault.com/blogs/security-essentials/how-to-get-into-infosec-infosec-career-path-hacking
