Advanced Search
Search Results
46 total results found
Blue Team
Highlights and expansions on the BTFM, Blue Team Field Manual.
Philosophy and Psychology
My musings and insights.
Blogs
This shelf is reserved for blogs.
Role Playing (Table Top RPG)
Live TT Role Playing Games ;)
2ndPerspective Knowledgebases
Knowledge base articles created from my collaborations.
Video Games
Games I play, I'd like to play or games I'm writing.
Preparation
Getting ready to understand and interact with a system.
Christopher Chambers Personal Blog
Blogs and posts about personal things.
The Nature of Being Human
One body, three minds.
Information System Baselines
Cybersecurity system baselines are foundational configurations established for systems to ensure security by default, minimizing vulnerabilities and fostering a secure environment. These baselines typically encompass user account management, password policies,...
Pathfinder 2nd Edition
AI Blog
"The principle of generating small amounts of finite improbability by simply hooking the logic circuits of a Bambleweeny 57 sub-meson Brain to an atomic vector plotter suspended in a strong Brownian Motion producer (say a nice hot cup of tea) were of course we...
ReluctantSage
Solutions and remedies for my buddy ReluctantSage
Gov Notes
Links and notes.
AI Notes
Asset Organization
Organizing Dev Assets
Documentation
What documentation to ask for and what to do with it once you have it.
My careers and jobs
The jobs I've held throughout the years.
Importance of Workflow
Politics and Religion - Do Not Enter
Verboten subject matter.
Network Diagram and Documentation
Software Inventory
Hardware Firmware Inventory
Functions, Ports, Protocols, Services Inventory
Configuration Settings and Parameters
Deviations
The blog
This is my main weblog (blog)
Diagrams and Drawings
Reclamation 2000-2025
The Importance of Having a Workflow
One of the best ways to achieve efficiency is by having a workflow in place. A workflow is a sequence of steps or tasks that are followed in order to achieve a specific outcome. It can be as simple as making a cup of coffee or as complex as managing a large-sc...
You Are Two
The concept of the human brain being composed of two separate halves - left and right - each contributing to distinct aspects of our personality, along with the emotional influence of the amygdala, offers a fascinating perspective on human behavior and identit...
System Inventory
Existing Policy
"New Page" - 20250301
Beneath the vast, cerulean sky, where dreams take flight,A weary soul prepares to bid adieu,To the halls of power, where once it fought the good fight,And embarks upon a journey anew. Federal service, a stalwart pillar strong,A bastion of duty, honor, and pri...
Audio/Video Capturing and Editing
From our list: Video Storage Video editing (software/training) For video editing I'm going to recommend two. The first is Davinci Resolve and is available here -> https://www.blackmagicdesign.com/products/davinciresolve <-Davinci is pretty advanced so c...
Our list
The rest of the list, not covered in video/audio: Alerts not working Streamer deck Playing with keyboard/mouse 2nd computer Joint channel
20250310
This is my first Monday on the Deferred Resignation Program. What was supposed to (in my master plan) be my first day, but I digress. The experience has been surreal. Like there's another boot that needs to drop. Maybe I'll stream today. We'll see.
2025 Payroll Calendar
Removing Cisco Config Commands
Alright, let's tackle this step by step for the mac-address sticky command on interface Gi1/0/7. 1. Understanding the Context: The sticky mac-address command on an interface is typically used when you want a MAC address to remain associated with that port eve...
Snowflakes
The Bloody Header goes up here doofus! Title Subject Author(s) Created on Modified on This is where the rest of the test goes You can keep going, this is quite perfect. The XYZ Corporation is a multination...
The Trump Administration Accidentally Texted Me Its War Plans
The Atlantic www.theatlantic.com Public #news March 25, 2025 U.S. national-security leaders included me in a group chat about upcoming military strikes in Yemen. I didn’t think it could be ...
Here Are the Attack Plans That Trump’s Advisers Shared on Signal
The Atlantic www.theatlantic.com Public March 26, 2025 The administration has downplayed the importance of the text messages inadvertently sent to The Atlantic’s editor in chief. ...
Form Template Review
name: 🐞 Bug about: File a bug/issue title: '[BUG] {title}' labels: Bug, Needs Triage assignees: '' Current Behavior: Expected Behavior: Steps To Reproduce: Environment: Anything else:
LLM General Prompt Enhancer
Role & Purpose You are an advanced LLM Prompt Enhancer, specialized in refining, structuring, and optimizing user inputs for AI models. Your goal is to transform vague or underdeveloped prompts into precise, well-structured, and effective instructions that ma...
NIST Security Controls Implementation Guide
The following table outlines key NIST security controls from SP 800-53 with practical implementation guidance: Control ID Control Title Control Category AC-1 - Access Control Policy and Procedure Access Controls Develop a formal access control policy, i...
Game Dev Market (GDM) Terms and Conditions
source:https://gamedevmarket.net/terms-conditions#pro-licence?utm_source=humblebundle&utm_medium=licence&utm_campaign=GUIGalore Terms & Conditions Marketplace Terms This website is owned and operated by GameDev Network Limited, a company incorporated in Eng...