Intro

Sal is a highly skilled and experienced craftsman technologist with over 16 years of success in the field of business intelligence and operation management. He has a proven track record of effectively overseeing all aspects of business operations, ranging from information technology and cyber security to project management and real estate development.

In addition to his technical expertise, Sal also possesses strong leadership and communication skills. He is able to effectively manage and motivate teams, as well as effectively communicate and collaborate with colleagues and stakeholders. Sal is known for his ability to think strategically and problem-solve, which has helped him drive projects to successful completion on time and within budget.

Throughout his career, Sal has demonstrated an ability to adapt and thrive in a variety of business environments. He is constantly seeking out new challenges and opportunities for growth and he is committed to staying up-to-date on the latest industry trends and technologies.

Edu. & Exp.

Edu.

CSUSB - BA No. 2 - Info. Tech. - Cyber Security 2024
Java Programing Object Oriented 2020
Cisco Networking Academy 2019
Structured Query Language (SQL) 2019
Python Programing 2019
HTML & CSS Language 2018
Cyber Security Virtualization 2018
Cyber Security Protocol Analysis 2018
Cyber Security Ethical Hacking 2018
RCC Community College - Cyber Security 2018
University of Phoenix - BA No. 1 - International Business 2010

Skills

Networking | LANs, WANs, WLAN, VoIP *****
Security | Cisco Meraki *****
Routing & Switches | Cisco *****
Virtualization | VMWare ****
Virtualization | AWS Cloud ****
Virtualization | Google Cloud ****
DHCP & Domain | Windows Server ****
Administrator | Google Admin ****
Pentesting | Kali Linux OS ***
Pentesting | Parrot OS **

Exp.

System Technology Development ( 2018 - Inst ) Contract
Cyber Security ( 2018 - Inst ) Contract
P.M. Commercial Development ( 2020 - 2022 ) Contract
P.M. Real Estate Development ( 2018 - 2022 ) Contract
A.G.I. ( 2008 - 2018 ) Info. Tech. Manager
M.E.W. ( 2004 - 2008 ) Project Manager
K.G.I. ( 2002 - 2004 ) Project Manager

Articles

Jan. 2023 - BEEF???

The Browser Exploitation Framework, or BeEF for short, is a tool used by penetration testers to assess the security of a target environment through client-side attack vectors. It does this by exploiting vulnerabilities in web browsers, which are often the weakest link in an otherwise secure system.

BeEF works by "hooking" onto one or more web browsers and using them as a starting point for launching directed attacks against the target system. This is done through the use of command modules, which are designed to exploit specific vulnerabilities or weaknesses in the browser or related software. By focusing on the web browser as the primary point of entry, BeEF is able to bypass the traditional security measures that are in place to protect a system, such as firewalls and anti-virus software.

One of the key benefits of BeEF is that it allows penetration testers to test the security of a target environment in a more realistic and comprehensive way. Rather than simply looking at the hardened perimeter of a network or the security of individual client systems, BeEF takes into account the vulnerabilities that may exist within the web browser, which is often the primary point of entry for attackers. This makes it an important tool for identifying and addressing potential security weaknesses before they can be exploited by malicious actors.

Dec. 2022 - Hidden Fingerprints inside Your Photos

Fingerprints are unique patterns found on the palms of our hands, created by the ridges and furrows on the surface of the skin. These patterns are formed randomly and are unique to each individual, making them useful in forensic science for identifying people. The uniqueness, universality, permanence, inimitability, and classifiability of fingerprints make their development and preservation essential, especially as they are often found at crime scenes. To preserve fingerprints, various methods such as casting material, latent print lifts, and photography techniques are used.

Forensic photography plays a crucial role in documenting physical evidence found at crime scenes. It can be done at the crime scene during the tagging, collection, and preservation process or within the laboratory during analysis. Regardless of where it is done, forensic photography permanently records the evidence as it appeared at the scene of the crime. Magnified photographs can be particularly helpful in comparing microscopic or fragile evidence. The documentation of physical evidence through photography also allows multiple people to analyze the evidence simultaneously and helps to prevent damage or loss of the evidence.

In a recent case, a drug dealer named Carl Stewart was arrested and sentenced to 13 years and six months in prison after his fingerprints were analyzed using a photograph of him holding a block of cheese. Stewart, 39, from Liverpool, northwest England, had sent the image of the Stilton cheese, which he had found at an upscale British grocery store, on an encrypted device called EncroChat. This messaging service is used exclusively by criminals and was infiltrated by police in a major operation the previous year. Authorities credited Stewart's "love of Stilton cheese" for his arrest and stated that he had pleaded guilty to conspiracy to supply cocaine, heroin, MDMA, and ketamine, as well as transferring criminal property.

Nov. 2022 - GPU Mining to Hashcat Password Cracking

GPUs (graphics processing units) are specialized devices that are designed to perform the complex calculations needed to render images and graphics on a computer. They are commonly used in a variety of applications, including gaming, graphic design, and rendering. In addition to these applications, GPUs can also be used for mining cryptocurrency, password cracking, and other tasks that require fast and efficient processing of large amounts of data.

The recent drop in cryptocurrency prices has had a negative impact on the profitability of GPU mining, leading many miners to shut down their rigs. However, there are still many other uses for GPUs, such as graphic design, rendering, and gaming.

Ethereum 2.0, the next major upgrade to the Ethereum blockchain, is now available. While it is not yet clear how this will affect the GPU mining industry, it is likely that miners will continue to look for alternate cryptocurrencies to mine or may choose to shut down their rigs until the market recovers.

As for other potential uses for GPUs, password cracking is one possibility. By using a cluster of GPUs, it is possible to perform password cracking tasks much faster than with a traditional CPU. However, it is important to note that password cracking is generally considered a nefarious activity and is illegal in many jurisdictions. It is only appropriate to use GPUs (or any other tool) for password cracking if you have explicit permission to do so for legitimate purposes such as testing the security of your own systems or performing authorized security assessments.

Contact



Hello World! ;)