Posts

Short brief presentation about AI

🧠 Cybersecurity & AI: The New Human #AIByCalculation Before machines, there were tally marks on stone walls . Humans counted, tracked, remembered. Over time, we built tools to help— abacuses, ledgers, locks, passwords . Each invention pushed the burden of memory and protection away from our hands. Then came automation. Scripts, programs, firewalls—machines that watched for us. But still, we wrote the rules. Still, we told them how to think. Until now. AI is not a tool we use. AI is a tool that builds tools. A machine that automates automation itself. It doesn’t just follow logic—it generates it . It doesn’t wait for our command—it calculates on instinct . 🔐 Cybersecurity Meets the Synthetic Mind In this new age, threats evolve in real-time . Phishing scams mimic your writing style. Malware morphs after every download. Ransomware thinks. You can’t write rulebooks fast enough. So we gave that job to AI. AI watches millions of logs, decodes patterns, flags anomalies— b...

The pretty and elegant woman that people may be curious of what she sees (Unfortunately, but not ultimately)

🔐 The Secret Cabinet: What Cybersecurity Really Protects She moves with quiet confidence. Red nails gleam as her hand slides a drawer shut— a sleek, obsidian cabinet clicks closed with a satisfying lock. A few passing coworkers glance her way, curious, maybe even envious. What’s in that drawer? A beauty secret? A confidential plan? A hidden flaw? They don’t know. And they never will —because what matters is not what's inside , but the fact that she protects it like it matters. And that’s exactly what cybersecurity does. 🧠 What Is Cybersecurity? Cybersecurity is the discipline of protecting digital assets , just like locking a file cabinet to keep prying eyes, greedy hands, or careless accidents from exposing what should stay private. Whether it's: Personal messages Banking information Proprietary code National secrets ...if it’s valuable, private, or powerful , it needs protecting. 🔒 Let’s Break Down the Cabinet Analogy Imagine the internet is a hig...

That depressed script: Unintended yet planned yesterday somehow till today

Image
Hey blog. Or just—hello, in general. Working online as a Cyber Hunter, competing with other hackers, can be stressful—until you find the one. Suddenly, you realize you're a hacker. Maybe it’s after submitting your first report, or maybe it’s in the moment you spot something others miss. Either way, the realization hits: I’m really doing this. At the same time, hacking while living with family, recovering from an abusive relationship—it’s brighter now. Back then, when people called me “talented but inconsistent,” I was actually fighting unbalance. I stopped showing up to interviews. Stopped going to parties. Stopped drinking—just a little—and sat alone. I was hurting, but I didn’t know it until I found Vodka. Eventually, staying aware saved me. Psychology, something I’d picked up and carried throughout my life, kept me grounded even in chaos. Despite rumors, misunderstandings, and conversations layered with contempt , I still bore the weight—miles away or not. Still, deep in my hea...

Strip down a Website example, a.k.a. Reverse Engineering skill UNLOCKED

Image
 🧠 How a Website Really Works — Broken Down Simply When you open a website like www.example.com , a lot goes on under the hood — but let’s strip it down to the core parts so you see exactly how it runs from top to bottom. 📍 Step 1: You Type a Website into Your Browser When you type a URL (like https://frizasecurity.com ) into your browser and hit Enter, the first thing that happens is: ✅ The browser needs to find the website's IP address. Think of the domain name (like frizasecurity.com ) as a contact name in your phone, and the IP address as the phone number. Your browser asks a DNS server (Domain Name System) to find the number behind that name. You type the name → Browser says: “What’s the IP address for this?” DNS responds: “Here it is: 123.456.789.10 .” 💡 DNS = like the internet’s phone book. 🔄 Step 2: Your Device Talks to the Server Now that your browser knows the IP address, it sends a request to the web server that hosts the site. Think of the...

How does CURL work?

Understanding cURL: The Data Transfer Tool with Hidden Power cURL is a command-line utility and library used to transfer data across networks via a wide range of protocols, including HTTP, HTTPS, and FTP. While often seen as a basic tool for developers, cURL holds advanced capabilities that are rarely discussed in mainstream tech media—capabilities that can significantly extend its usefulness. What cURL Is Really For At its foundation, cURL enables several key functions for easier access in flow: Data Transfer : Seamlessly transfers data across systems using various protocols. API Testing : Enables developers to test, debug, and interact with web APIs. Web Scraping : Extracts content from web pages for analysis or storage. Network Diagnostics : Helps test connectivity and troubleshoot network issues. Automation : Supports scripting and workflow automation for regular data exchanges. However, beyond these standard uses, cURL also offers deeper, often overlooked cap...

Ensuring metadata to our advantage

How Metadata Can Reveal More Than You Think: Unlocking Hidden Secrets At first glance, metadata might seem like a dry, technical term—something you’re not meant to notice or care about. But when you dive into it, you’ll discover that metadata isn’t just about technical details—it’s a powerful tool that can reveal much more about your digital life than you might realize. In fact, metadata can expose hidden patterns, behaviors, and even personal information that many would prefer to keep private. Imagine walking through a busy street, where everyone carries a digital device. As you glance at the crowd, you may only see faces and bodies, but metadata is like the invisible thread that connects everything. It holds the information that describes these interactions, often without you even knowing it. In this article, we’re going to pull back the curtain on metadata and show you how it can reveal more than you might ever expect. 1. What Is Metadata? Before we get into the juicy details, let...

Ensure data gets where it needs to go

 Networking Fundamentals  Networking might seem complex, but when broken down, it becomes more intuitive and even fascinating. At its core, networking is about connecting things and making sure they can communicate with each other efficiently. To understand networking better, let's use a real-world analogy. Imagine a City and Its Roads Think of a network like a city, where the buildings represent devices (like computers, smartphones, or servers), and the roads between them represent the connections that allow data to travel. Key Concepts: Devices and Connections Devices (Buildings) : These are like the houses or buildings in the city. Every device, whether it's your phone, laptop, or a server, has a unique address. Just like every building has an address so that you can send mail to it, devices have IP addresses . Connections (Roads) : The roads in the city are how the buildings communicate with each other. These roads can be wired (like Ethernet cables) or wire...

Chle0ooo's my senior, not "babies"

Image
 My gorgeous Chleo, or really, she's her own. I might've mentioned before how I was maintaining or likely saying taking care of my dog. She's 12 years old, and she's been great... My aunt and I made a bet about how long my dog will live... Originally it was 14 years she lives, I get $600? But we changed it to 16 years old that Chleo will surpass... Not a challenge, I might as well say 23... That would be the real challenge but we're not there so, Chleo's arthritis has calm down... Since 2023, Chleo has gotten much better and has gained a few pounds. With that being said, she has handled, even better than before, learning to step away from situations of chaos, even when I'm not around, and learning how to communicate with her moans? Truly, I should have paid attention more, because dogs actually do know what we're saying. It is up to us owner to develop a routine for them if we don't have a routine for themselves unless they've developed their own...

API Security Risks & How to Mitigate Them

As the backbone of modern web services, Application Programming Interfaces (APIs) are integral to the connectivity and functionality of digital ecosystems. However, with the rise in their usage, APIs have become a prime target for cyberattacks. APIs allow communication between different systems, making them a gateway for malicious actors to exploit vulnerabilities in authentication, data exposure, and authorization. Given the increasing frequency of API-related security breaches, it is essential to critically examine the risks associated with APIs and develop effective strategies for mitigating these vulnerabilities. In this research, I will explore these security risks and offer practical solutions to reduce exposure to potential threats. Background & Literature Review Understanding API Security Risks The importance of APIs in the modern digital landscape cannot be overstated. APIs are the bridges between different services, enabling the exchange of data and functionality. Howe...

How to maintain your senior dog.

Image
 So from what I searched from the internet, Microsoft's Search Engine (SE), Bing, "What dogs require to live a long time" and here's what I got. From PetMD , titled "21 Longest-Living Dog Breeds", says on a list, 1. Chihuahua. Life expectancy: 14-16 years. ..." I'mma stop right there. I have an 11-year-old senior chihuahua. If you want to know more about the list, click the link in the text.  #Bluehyperlink, thanks.  Chleo is the name of my dog. I've been trying to change it to Cleo, short for Cleopatra but no matter the case, it's always going to be Chleo. This is her: I believe she's young, healthy, and I'd like to keep my senior dog young forever! T.T, nothings impossible! Anyways, because she is a chihuahua, one mixed with wiener dog. I don't know if that makes a difference but maybe it does to prevent complications. No boast. She cries when my family and I leave for a vacay, I hear that she cries or even howls. Now, she crie...

Home invasion

Image
Inside the house, as it was years ago, playing game with my cousins. Where, I was a pre-mature man in my dream, I stayed near the corner of the room with my back facing the wall and my front having access to face the living room and hallways. Yet, my viewpoint changed after everyone got intense in the game, clowns nonchalantly appeared inside the house, surrounding us. They play Russian roulette from the clown's influence, all bigger than us, taller than us, as the henchman clowns inject something in us, a blue serum. I try to grab something, subtly searching, yet the clown the clown with orange points at me, like he'd be the leader of them. He noticed my movements to seemed to have caused them to push us all outside. Outside, in the front of the house, at the entrance of the driveway of the house, as the clowns stood in the street and sidewalk, surrounding us, watching us just as intensely as we watched the video games on the big box tv, on xbox's first generation counsel....