PID Perspectives

Stay in the Know with Our Blog

START READING

Latest Articles

Life at Negative PID

Goodbye Canada

I still remember how excited I was when I landed in Montreal for the first time. As a European, I thought of Canada as the Switzerland of North America—a place…

Read More »
Digital investigations

The Identity of Satoshi Nakamoto

The mystery of the identity of Satoshi Nakamoto is one of the most compelling enigmas in tech history. Satoshi is a mythic figure, almost like the crypto world’s own Banksy.…

Read More »
Cybercrime

The Sony PlayStation Network Hack

On April 17, 2011, the PlayStation Network (PSN), along with Qriocity and Sony Online Entertainment (SOE), went down, leaving users without access to the platform for twenty-three days. The incident…

Read More »
Cybersecurity

A quick-start guide to Unix commands

Unix is a powerful, multiuser operating system that serves as the foundation for Linux and MacOS. The Unix command-line interface (CLI) allows you to control your system efficiently by typing…

Read More »
Cybersecurity

An Introduction to CMMC

If you work as a contractor for the United States Government, you must comply with stricter security rules than standard companies. One of these frameworks is CMMC (Cybersecurity Maturity Model…

Read More »
Cybersecurity

How to become a bug bounty hunter

Many people entering the cybersecurity field believe that the only way to demonstrate their skills to a prospective employer is to hack into their systems. Unless unsolicited, that’s a bad…

Read More »
Cybersecurity

A beginner’s guide to Blockchain

Everybody talks about Bitcoin and Blockchain. In recent years, they have become a common topic in tech, finance, cybersecurity, and even politics. But what do they really mean? If you…

Read More »
Digital investigations

The mystery of Cicada 3301

The Internet is like a vast world to be explored. Like any unexplored space, it’s full of wonders and possibilities, but also holds mysteries and dark corners. Cicada 3301 is…

Read More »
Computer Forensics

Learning time series analysis through CDR

In January, I started attending police-led training on CDR analysis through the American Association of Crime Analysts. This topic is particularly fascinating for anyone with a background in working with…

Read More »
Register to access our content

Create Your Account

Focus Topics

Featured Articles

For beginners and non-technical audience
Geek Zone
Life at Negative PID
All topics
Click to access the login or register cheese
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO