Skip to content

Carl Lochstampfor Jr. ePortfolio

Cybersecurity Undergraduate at Old Dominion University (ODU)

  • Home
    • About Me
    • Certifications
    • Awards & Recognitions
    • Goals & Future Plans
  • Milestone Projects
  • Resume
  • Coursework
    • Cybersecurity Foundations
      • CYSE 250: Basic Cybersecurity Programming
      • CYSE 300: Intro to Cybersecurity
      • CYSE 301: Cybersecurity Techniques and Operations
      • IT 315: Intro to Networking & Security
      • CYSE 462: Cybersecurity Fundamentals
      • MATH
    • Cybersecurity Applications
      • CYSE 270: Linux for Cybersecurity
      • CYSE 280: Windows System Management & Security
    • Tech & Society
      • CYSE 200T: Cybersecurity, Technology, & Society
      • CYSE 201S: Cybersecurity & Social Science
    • Law & Ethics
      • CYSE 406: Cyber Law
  • Blog
  • News
  • Contact

Category: Code

Linux – Automation using Crontab & Scheduling Tasks

Overview of Linux crontab and task scheduling, including automated backups, user management, shell scripting, compressed archives, and recurring system tasks.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Linux: Group & User Management

Overview of Linux user and group management, including account creation, permissions, ownership, access control, and best practices for secure system administration.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Linux: Cracking Passwords

Explores Linux password cracking concepts, including hashing, shadow files, attack methods, and how ethical testing improves authentication security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Determinism within Cybersecurity & Computer Hacking

An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The NotPetya Cybersecurity Attack & Breach

Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Linux Exercise – File Permission

Explains Linux file permission concepts, including read, write, execute rights, ownership, and how proper permission management enhances system security.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Linux: Lab 3 -VI Editor (VM)

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept