Skip to content

Locky

Carl Lochstampfor Jr

  • Home
    • About Me
    • Certifications
    • Resume
      • Skills
      • Experience
      • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Networking & Programming
    • CYSE 300: Intro to Cybersecurity
    • CYSE 301
    • IT 315: Intro to Networking & Security
    • ECE 416
    • ECE 419
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W
  • Law & Ethics
    • CRJS 405
    • CYSE 406: CYBER LAW
  • Internship
    • CYSE 368
  • Cybersecurity Applications
    • CYSE 270: Linux for Cybersecurity
    • CYSE 280: Windows System Management & Security
    • CYSE 407
    • CYSE 494
  • Blog
  • News
  • Wikis
  • Contact

Author: cloch001

Linux: Cracking Passwords

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Darknet Diaries: ZeuS

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Darknet Diaries: Alberto

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Darknet Diaries: Human Hacker

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Linux: Group & User Management

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Linux: Lab 3 -VI Editor (VM)

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Darknet Diaries: Olympic Destroyer

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Darknet Diaries: Shadow Brokers

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Darknet Diaries: NotPetya Attack

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Windows Server ed. History

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Ensuring Accessibility when Implementing the CIA Triad

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Designing the Public Sphere with Intelligification

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Cyber Technology in Workplace Deviance

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

ICS SCADA: Their Role & Importance

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Exploring Attacks on Availability: Rootkits

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Human Factors: A CISO’s Response to Human Error & Threats

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Search and Seizure Warrant ** MOCK **

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The Need for Cybersecurity in Today’s Economy

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

AI, the Metaverse, & DEI

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The Law & Encryption Workarounds

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The “Human Firewall”

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

First Amendment Freedoms & Protections: The Cyber World and You

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

“Going Dark”

An Overview and Analysis of Former FBI Director James Comey’s Security Concerns aboutLaw Enforcement and Encryption

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Cybercrime: Using Psychological Theories to Understand & Prevent It

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Hacking Humans

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Opening & Protecting an Online Business & IP

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The CIA Triad & the AAA Framework

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Victim Precipitation in Cyber Victimization & Potential Remedies

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Creating Cybersecurity Policies: Data Loss Prevention (DLP)

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Whistleblowing vs. Espionage: A Brief Review of Julian Assange

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Protecting Availability of Your Systems: A CISO’s Perspective

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Reducing Human Errors That Influence Data Breaches

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

System Administrator Roles & Responsibilities

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Components of a Business: What They Are & Their Relation to IT & Cybersecurity

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Determinism within Cybersecurity & Computer Hacking

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The NIST Cybersecurity Framework & the Importance of Proper Documentation

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Free Speech & Social Media Platforms

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
Translate »
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept