PID Perspectives

Stay in the Know with Our Blog

START READING

Latest Articles

Cybersecurity

How to install and enable an SSH Server

In one of our previous articles, we introduced you to SSH authentication and its basic usage. However, you can’t use SSH as an authentication method unless the machine you want…

Read More »
Cybercrime

Kevin Mitnick, the ghost in the wires

Kevin Mitnick is one of the most well-known figures in the history of hacking and cybersecurity. His life story reads like a cyber-thriller, and he influenced how the public and…

Read More »
Crime analysis

Learning link analysis with TXLEAN

Last week, I attended a training session on link analysis with TXLEAN – the Texas Law Enforcement Agency Network. Link analysis is a valuable and powerful tool to fight traditional…

Read More »
Compliance and Regulations

The Edward Snowden Leaks

In May 2013, a group of journalists at The Guardian started receiving classified information through encrypted channels from an anonymous source. On June 5, after verifying its validity, the newspaper…

Read More »
Cyberpsychology

Making money with MMORPGs

MMORPGS are online video games that blend role-playing games with massive online multiplayer features. In these games, thousands (or even millions) of players interact in a persistent virtual world, creating…

Read More »
Cybercrime

The Target Data Breach

Target is an American retail corporation that operates a chain of discount department stores and hypermarkets. It is the seventh-largest retailer in the United States and is headquartered in Minneapolis,…

Read More »
Life at Negative PID

Join our tag hunt!

Get Ready for the Great Negative PID Tag Hunt: A New Adventure from Canada to Spain! Get ready, folks, because something exciting is coming your way! Here at Negative PID,…

Read More »
Cybersecurity

An introduction to SSH

How do you access a computer without physically having access to it? How can you execute commands from another computer? Secure Shell (SSH) is one of the first tools you…

Read More »
Computer Forensics

Understanding UNIX OSs

The UNIX operating system (OS) is a powerful, multiuser, multitasking system initially developed in the 1970s at Bell Labs. Known for its modular design and portability, UNIX has influenced many…

Read More »
Register to access our content

Create Your Account

Focus Topics

Featured Articles

For beginners and non-technical audience
Geek Zone
Life at Negative PID
All topics
Click to access the login or register cheese
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO