Profile

Jay-Ar Rivera
Member since: January 2013
Areas of Interest: Cloud Computing, Hardware, Mobile & Wireless, Networking, Software, Virtualization
Activity
No records.
Friends' Activity
-
The CISSP is a valuable certification, but it takes a lot more than just your many years of experience to prepare for it. You will likely have to learn about a lot of technology and processes that you’ve never worked with, some of it not especially current and all of it a lot less vendor-specific than you’ve ever imagined.
1 day 5 hours ago
-
Oh, Danny Boy, the pipes, the pipes are calling. But if you want to call them back, you need to give them names.
1 week 1 day ago
-
A new spam run targeting fans of the cult show Breaking Bad proves that for spammers (and other business folk) we are the sum of the niche groups we align ourselves with.
2 weeks 6 hours ago
-
Sandra Henry-Stocker commented on Unix: Tracking disk space usageThanks, Fred! For the typo fix and for sharing the script. I hope all is well with you. :-)
No matter how much disk space you add to a system, sooner or later you're going to run short. But watching disk space get slowly used up is a lot like watching grass grow. How do you avoid a disk space crisis and avoid being lulled into a data stupor?2 weeks 1 day ago
-
Sandra Henry-Stocker wrote Security: Book Review -- The Practice of Network Security Monitoring, Richard Bejtlich, no starch press, July 2013 If you work in cyber security or incident response, you MUST read this book. It is the best book ever for preparing yourself and your staff for handling inevitable network intrusions.2 weeks 1 day ago
-
DIY electronics is entering a golden age with the help of powerful, cheap, programmable devices like the Arduino micro controller and Raspberry Pi mini computer. But the DIY potential of these new platforms isn't limited to consumer applications. Here's a look some security tools you can make yourself.
2 weeks 3 days ago
-
No matter how much disk space you add to a system, sooner or later you're going to run short. But watching disk space get slowly used up is a lot like watching grass grow. How do you avoid a disk space crisis and avoid being lulled into a data stupor?
3 weeks 4 hours ago
-
The only thing wrong with sed is that most of us barely grasp how powerful it is. We use it in pipes to change "this" to "that", but we rarely consider it for the big editing jobs where it could save us considerable time and effort -- especially when it comes to boring repetitious work.
4 weeks 3 hours ago
-
Moving files between Linux (and other) servers is a lot smarter and more versatile when you discover lftp.
5 weeks 1 day ago
-
Cisco has added to its Wi-Fi router line by introducing new products that support new security standards. The networking giant will also be partnering with AirDefense to add the latter's intrusion detection system to Cisco's wireless products.
5 weeks 5 days ago
-
Recent revelations about wide ranging and warrantless government surveillance don’t mean that email is dead – just that you can’t ever trust it again!
5 weeks 5 days ago
-
Cisco has added to its Wi-Fi router line by introducing new products that support new security standards. The networking giant will also be partnering with AirDefense to add the latter's intrusion detection system to Cisco's wireless products.
5 weeks 5 days ago
-
Recent revelations about wide ranging and warrantless government surveillance don’t mean that email is dead – just that you can’t ever trust it again!
5 weeks 5 days ago
-
Log files on Unix systems can easily grow to hundreds of thousands or even millions of lines. Here's a simple way to pluck out every Nth line.
6 weeks 1 day ago
-
The things that make you love a job or drive you to thinking about moving on may have less to do with how much you earn than whether you look forward to Monday morning.
6 weeks 5 days ago
-
7 weeks 22 hours ago
-
Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government- and private sector snooping on their personal lives.
7 weeks 5 days ago
-
Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government- and private sector snooping on their personal lives.
7 weeks 5 days ago
-
Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government- and private sector snooping on their personal lives.
7 weeks 5 days ago
-
Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government- and private sector snooping on their personal lives.
7 weeks 6 days ago
-
You need to understanding routing tables if you're going to do any kind of network troubleshooting. Let's take a look at what Linux commands can tell you about how your system is making connections.
8 weeks 1 day ago
-
Sitting in a chair for 40 or more hours a week might seem like the makings of a good life if it's combined with an impressive salary, but if you value your health and/or your career, you might rethink your priorities. This invaluable book could add years to your life and keep you feeling good well into retirement. Let me repeat that. This invaluable book ...
8 weeks 2 days ago
-
Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences was the myriad of ways that intelligent machines – from televisions to automobiles to medical devices – are creating new privacy and security risks.
9 weeks 11 hours ago
-
Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences was the myriad of ways that intelligent machines – from televisions to automobiles to medical devices – are creating new privacy and security risks.
9 weeks 11 hours ago
-
Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences was the myriad of ways that intelligent machines – from televisions to automobiles to medical devices – are creating new privacy and security risks.
9 weeks 11 hours ago
- 1 of 7
- ››














