(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 3 min read
Prevent identity theft by opting out of pre-approved credit offers, using optoutprescreen, and protect your personal information from unauthorized access.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 3 min read
Learn why mastering programming skills can greatly benefit your IT and Cyber Security career, and how to get started with PowerShell, Bash, Python, Ansible, Packer, and Terraform.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 3 min read
This article discusses the dangers of storing cryptocurrency on exchanges, explaining why it is equivalent to storing money in a mattress, and highlights the benefits of using a hardware wallet for secure storage.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 6 min read
The DoD 5220.22-M specification is a critical standard for securely erasing sensitive information from digital storage media, widely used by the U.S. military and government organizations.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 5 min read
This article explores the advantages and disadvantages of bootcamps, and helps individuals determine if they are the right choice for quickly acquiring new skills and certifications.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 4 min read
Discover the key skills and trends shaping the field of system administration, including the differences between system and network administration, the facets of Windows, Linux, hardware and software, and virtualization administration, and the rise of cloud platforms and services.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 3 min read
Learn about the NIST approved ways to sanitize hard drives, SSDs, USB flash drives, CDs, DVDs, and Blu-ray disks to protect sensitive data from unauthorized access.
(Modified:
2026-03-10)
— Written by
SimeonOnSecurity— 4 min read
This article discusses the steps to improve data security by disabling older versions of SSL and TLS protocols, which are vulnerable to cyber threats such as POODLE, BEAST, and Heartbleed, in Windows and Linux systems.