Wednesday, December 6, 2017


I'm looking into the Toptal software developers Network for consulting projects, and I have to say it looks interesting.  With my background in Security, DevOps, Application Development, and Infrastructure, I think it will be a good place to find new projects.

So why do I think I would be a good fit for TopTal projects?

To begin with, I love working with computers and have an extensive background in that area.  My degree is in CSE, and just basic stuff like knowing Java, C/C++, JavaScript, Python, and a slew of other languages for both coding and scripting are all good points.  My continued education with AWS Certification and Certified Ethical Hacker (CEH) training also show how I like to learn new things.  And research into DevOps methodologies, artificial intelligence, and robotics is important to extending my capabilities beyond just basic computing.

We will see how it goes with TopTal.  I will keep you posted here on any relevant updates!

RingCentral Professional Sign Up Bonus: FREE rollover minutes

Tuesday, September 12, 2017

BlueBorne Bluetooth Vulberabilities

Security researchers have discovered eight vulnerabilities -- codenamed collectively as BlueBorne-- in the Bluetooth implementations used by over 5.3 billion devices. Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BleuBorne flaws, nor does the attacker need to pair with a target device. They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, impacting almost all Bluetooth device types, from smartphones to laptops, and from IoT devices to smart cars. Furthermore, the vulnerabilities can be concocted into a self-spreading BlueTooth worm that could wreak havoc inside a company's network or even across the world. "These vulnerabilities are the most serious Bluetooth vulnerabilities identified to date," an Armis spokesperson told Bleeping Computer via email. "Previously identified flaws found in Bluetooth were primarily at the protocol level," he added. "These new vulnerabilities are at the implementation level, bypassing the various authentication mechanisms, and enabling a complete takeover of the target device."