Published in DataDrivenInvestor·Feb 9, 2021Member-onlyWhy Everyone Should Know the 50/30/20 RuleThe 50/30/20 rule was popularized by Senator Elizabeth Warren’s book All Your Worth: The Ultimate Lifetime Money Plan. …Money5 min readMoney5 min read
Dec 10, 2018Member-only5 Python Libraries for Cyber SecurityIntroduction Python is currently one of the fastest growing and most in demand languages. It’s usefulness has been proven in software engineering and data science. Another useful application of the language is for building cyber security tools. …Python3 min readPython3 min read
Dec 7, 2018Member-onlyPrinting in Color with PythonIntroduction Today I wanted to show you multiple ways that you are able to have your console output be colored in your Python scripts. Termcolor The first module we’ll explore is termcolor. Termcolor allows you to use ANSI color formatting with your console output. To install termcolor you run: $ pip install…Python2 min readPython2 min read
Dec 5, 2018Member-onlyThe Best Podcasts for Cyber Security EnthusiastsI recently read the story “The best podcasts for new coders, and the best tools for listening to them” by Ayo Isaiah and thought it was a great story and was inspired to write my own for cyber security podcasts. …Podcast3 min readPodcast3 min read
Dec 3, 2018Member-onlyBuilding a Port Scanner in 16 Lines of CodeIntroduction Another great tool to learn how to make is a port scanner. These tools can be very useful to be able to identify opened ports on your hosts or firewalls that are not meant to be open. Building a port scanner can be very simple but allows for other features…Programming3 min readProgramming3 min read
Nov 30, 2018Member-onlyWhat is the CIA Triad and Why You Should CareIntroduction Every day we see on the news of a new data breach or a new ransomware attack plaguing our society. With the rapid adoption of technology in all sectors it is becoming increasingly difficult to protect and secure it properly. According to the Ponemon Institute’s 2017 State of Cybersecurity in…Security4 min readSecurity4 min read
Nov 28, 2018Member-onlyPackaging Python Scripts into CLI CommandsIntroduction Today I want to show you how you can turn a python script from this: $ python3 coolscript.py To this: $ coolscript How It’s Done How you are able to change a python script into a full fledged CLI command is by leveraging setup.py. …Python3 min readPython3 min read
Nov 28, 2018Member-onlyBuilding a Hashing Tool with PythonIntroduction I believe that it is very important to understand not only how to use a tool but also how it works. Today I will be demonstrating how you can create a CLI tool in Python to hash files. Setup I am going to use Python3 to build this tool so you…Python2 min readPython2 min read