Open in app

Sign In

Write

Sign In

Chris Doucette
Chris Doucette

216 Followers

Home

About

Published in DataDrivenInvestor

·Feb 9, 2021

Why Everyone Should Know the 50/30/20 Rule

The 50/30/20 rule was popularized by Senator Elizabeth Warren’s book All Your Worth: The Ultimate Lifetime Money Plan. …

Money

5 min read

Why Everyone Should Know the 50/30/20 Rule
Why Everyone Should Know the 50/30/20 Rule
Money

5 min read


Dec 10, 2018

5 Python Libraries for Cyber Security

Introduction Python is currently one of the fastest growing and most in demand languages. It’s usefulness has been proven in software engineering and data science. Another useful application of the language is for building cyber security tools. …

Python

3 min read

5 Python Libraries for Cyber Security
5 Python Libraries for Cyber Security
Python

3 min read


Dec 7, 2018

Printing in Color with Python

Introduction Today I wanted to show you multiple ways that you are able to have your console output be colored in your Python scripts. Termcolor The first module we’ll explore is termcolor. Termcolor allows you to use ANSI color formatting with your console output. To install termcolor you run: $ pip install…

Python

2 min read

Printing in Color with Python
Printing in Color with Python
Python

2 min read


Dec 5, 2018

The Best Podcasts for Cyber Security Enthusiasts

I recently read the story “The best podcasts for new coders, and the best tools for listening to them” by Ayo Isaiah and thought it was a great story and was inspired to write my own for cyber security podcasts. …

Podcast

3 min read

The Best Podcasts for Cyber Security Enthusiasts
The Best Podcasts for Cyber Security Enthusiasts
Podcast

3 min read


Dec 3, 2018

Building a Port Scanner in 16 Lines of Code

Introduction Another great tool to learn how to make is a port scanner. These tools can be very useful to be able to identify opened ports on your hosts or firewalls that are not meant to be open. Building a port scanner can be very simple but allows for other features…

Programming

3 min read

Building a Port Scanner in 16 Lines of Code
Building a Port Scanner in 16 Lines of Code
Programming

3 min read


Nov 30, 2018

What is the CIA Triad and Why You Should Care

Introduction Every day we see on the news of a new data breach or a new ransomware attack plaguing our society. With the rapid adoption of technology in all sectors it is becoming increasingly difficult to protect and secure it properly. According to the Ponemon Institute’s 2017 State of Cybersecurity in…

Security

4 min read

What is the CIA Triad and Why You Should Care
What is the CIA Triad and Why You Should Care
Security

4 min read


Nov 28, 2018

Packaging Python Scripts into CLI Commands

Introduction Today I want to show you how you can turn a python script from this: $ python3 coolscript.py To this: $ coolscript How It’s Done How you are able to change a python script into a full fledged CLI command is by leveraging setup.py. …

Python

3 min read

Turning Python Scripts into CLI Commands
Turning Python Scripts into CLI Commands
Python

3 min read


Nov 28, 2018

Building a Hashing Tool with Python

Introduction I believe that it is very important to understand not only how to use a tool but also how it works. Today I will be demonstrating how you can create a CLI tool in Python to hash files. Setup I am going to use Python3 to build this tool so you…

Python

2 min read

Building a Hashing Tool with Python
Building a Hashing Tool with Python
Python

2 min read

Chris Doucette

Chris Doucette

216 Followers

Cybersecurity Analyst and Finance Enthusiast

Following
  • Tom Kuegler

    Tom Kuegler

  • Netflix Technology Blog

    Netflix Technology Blog

  • Karthik Rajan

    Karthik Rajan

  • LeadingAgile

    LeadingAgile

  • Jessica Wildfire

    Jessica Wildfire

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech