| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This will be a two part talk discussing the DeAuth Tool and the Pi-Hole and how you can use both to keep your network safer. Been working in IT professionally for 20 years, but has been working on computers since his parents purchased him a vic 20. He is a Navy veteran, that has worked for companies that range from major computer companies, to companies that make milking equipment for cows. His current position is a blue teamer, but his heart and mind has always been as a red teamer.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast