DEV Community

simeononsecurity profile picture

simeononsecurity

SimeonOnSecurity (SOS) is a leading source of information in the realm of security, automation, best practices, crypto, and more.

Location World Wide Web. Joined Joined on  Personal website https://simeononsecurity.com github website

Education

Self Taught

Work

Cyber Security Educator

Decentralization Dynamics: Mastering the 3.2.1-1 Rule for Blockchain Resilience

Decentralization Dynamics: Mastering the 3.2.1-1 Rule for Blockchain Resilience

Comments
2 min read
Triple Mining GPS Revolution: Geodnet, Onocoy, and RTKDirect Unleashed!

Triple Mining GPS Revolution: Geodnet, Onocoy, and RTKDirect Unleashed!

Comments
1 min read
Empowering Cybersecurity: ChatGPT Boosts Threat Detection

Empowering Cybersecurity: ChatGPT Boosts Threat Detection

Comments
1 min read
ADSB SDR Adapter Performance in Flight Tracking: Key Insights and Comparisons

ADSB SDR Adapter Performance in Flight Tracking: Key Insights and Comparisons

Comments
1 min read
Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning

Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning

Comments
1 min read
Geodnet MobileCM UM980 Upgrade & Alternative Mini-PCIe Cards

Geodnet MobileCM UM980 Upgrade & Alternative Mini-PCIe Cards

Comments
1 min read
Unveiling the Best GPS Antennas: Optimize Onocoy & Geodnet Earnings!

Unveiling the Best GPS Antennas: Optimize Onocoy & Geodnet Earnings!

Comments
1 min read
Effortless NAS Setup: Turn Linux into a High-Performance Server

Effortless NAS Setup: Turn Linux into a High-Performance Server

Comments
1 min read
Tech Jargon Glossary: A Beginner's Guide to IT and Cyber Security Acronyms

Tech Jargon Glossary: A Beginner's Guide to IT and Cyber Security Acronyms

Comments
1 min read
Cracking Up: Exploring Hilarious Cybersecurity Jokes

Cracking Up: Exploring Hilarious Cybersecurity Jokes

Comments
3 min read
Why Regulatory Compliance Alone Doesn't Ensure Security

Why Regulatory Compliance Alone Doesn't Ensure Security

Comments
3 min read
Why User Training Trumps Advanced Tech in Cybersecurity

Why User Training Trumps Advanced Tech in Cybersecurity

Comments
4 min read
Human Error: A Leading Cause of Data Breaches

Human Error: A Leading Cause of Data Breaches

Comments
3 min read
Nation-States in Cyber Warfare

Nation-States in Cyber Warfare

Comments
5 min read
Why Password Complexity Rules Are Outdated: Modern Security Solutions

Why Password Complexity Rules Are Outdated: Modern Security Solutions

Comments
3 min read
Should Hacking Back Be Legalized? Exploring the Debate

Should Hacking Back Be Legalized? Exploring the Debate

Comments
2 min read
Why Open Source Software Outshines Proprietary Security

Why Open Source Software Outshines Proprietary Security

Comments
4 min read
Mastering OPSEC: 6 Essential Steps for Digital Security

Mastering OPSEC: 6 Essential Steps for Digital Security

Comments
10 min read
Is Ubiquiti UniFi Good for Home Use? Find Effortless Connectivity

Is Ubiquiti UniFi Good for Home Use? Find Effortless Connectivity

Comments
3 min read
Effortless WingBits Mining Guide: Low-Cost and Optimized Hardware Setup

Effortless WingBits Mining Guide: Low-Cost and Optimized Hardware Setup

Comments
1 min read
Ubiquiti UniFi Firewall vs pfSense: A Comprehensive Comparison

Ubiquiti UniFi Firewall vs pfSense: A Comprehensive Comparison

Comments
5 min read
Effortless Security: Mastering Secure SSHD Configurations

Effortless Security: Mastering Secure SSHD Configurations

Comments
6 min read
Comparing Azure DevOps, GitHub, GitLab, and BitBucket: Finding the Best Code Repositories

Comparing Azure DevOps, GitHub, GitLab, and BitBucket: Finding the Best Code Repositories

Comments
7 min read
Budget DIY GPS/GNSS Base Station / Receiver Setup with ESP32 and UM980

Budget DIY GPS/GNSS Base Station / Receiver Setup with ESP32 and UM980

2
Comments
12 min read
Demystifying Cybersecurity Jargon: Your Guide to Digital Defense

Demystifying Cybersecurity Jargon: Your Guide to Digital Defense

Comments
6 min read
Exploring the Best Cybersecurity Memes and Pop Culture References

Exploring the Best Cybersecurity Memes and Pop Culture References

1
Comments 1
6 min read
Top Cybersecurity Movies - Thrilling Tales of Digital Defenders

Top Cybersecurity Movies - Thrilling Tales of Digital Defenders

Comments 1
5 min read
Ultimate IT Toolkit: Boost Efficiency with Essential Tools & Gadgets

Ultimate IT Toolkit: Boost Efficiency with Essential Tools & Gadgets

Comments
7 min read
Boost PowerShell Performance: Harness Ngen for Effortless Speed

Boost PowerShell Performance: Harness Ngen for Effortless Speed

Comments
1 min read
Virtualization Showdown: VMware ESXi, Citrix XenServer, Hyper-V, Proxmox VE, XCP-NG

Virtualization Showdown: VMware ESXi, Citrix XenServer, Hyper-V, Proxmox VE, XCP-NG

Comments
1 min read
Windows Registry vs. Linux Config Files: Cybersecurity Showdown

Windows Registry vs. Linux Config Files: Cybersecurity Showdown

Comments
1 min read
Securing Windows and Linux: PowerShell vs. Python - Cybersecurity Comparison

Securing Windows and Linux: PowerShell vs. Python - Cybersecurity Comparison

Comments
1 min read
Enhance Privacy: Writing Privacy.com Virtual Card Numbers to Physical Cards

Enhance Privacy: Writing Privacy.com Virtual Card Numbers to Physical Cards

Comments
1 min read
Cybersecurity Showdown: Windows Task Scheduler vs Linux Cron Jobs

Cybersecurity Showdown: Windows Task Scheduler vs Linux Cron Jobs

Comments
1 min read
Budget-Friendly 10g pfSense Build with HP t640 for Effortless Networking

Budget-Friendly 10g pfSense Build with HP t640 for Effortless Networking

1
Comments
1 min read
The Guide to Undercover Pentesting Disguises

The Guide to Undercover Pentesting Disguises

1
Comments
2 min read
Mullvad vs ProtonVPN: Effortless Security Showdown - Which One's for You?

Mullvad vs ProtonVPN: Effortless Security Showdown - Which One's for You?

Comments
1 min read
DIY Onocoy Ntrip Server and Reference Station Setup

DIY Onocoy Ntrip Server and Reference Station Setup

Comments
1 min read
The Ultimate Guide to Money Earning Apps for Mobile Devices

The Ultimate Guide to Money Earning Apps for Mobile Devices

1
Comments
1 min read
Mine Verus on Android: Easy Guide to Smartphone Mining

Mine Verus on Android: Easy Guide to Smartphone Mining

Comments
1 min read
Navigating Phishing Trends: Protecting Against Evolving Cyber Threats

Navigating Phishing Trends: Protecting Against Evolving Cyber Threats

Comments
1 min read
Choosing Between pfSense and Firewalla for Enhanced Network Security

Choosing Between pfSense and Firewalla for Enhanced Network Security

Comments
1 min read
Enhancing Home Network Security with Firewalla

Enhancing Home Network Security with Firewalla

Comments
1 min read
FedRAMP: Empowering Secure Cloud Solutions for Government

FedRAMP: Empowering Secure Cloud Solutions for Government

Comments
1 min read
FISMA: Enhancing Federal Cybersecurity for Safer Data

FISMA: Enhancing Federal Cybersecurity for Safer Data

Comments
1 min read
loading...