Skip to content

Instantly share code, notes, and snippets.

View cywf's full-sized avatar
:shipit:
Tinkering

Kylo P cywf

:shipit:
Tinkering
View GitHub Profile
@cywf
cywf / pix4d-rtk-gps.md
Last active May 31, 2024 05:56
Pix4D Combined with RTK GPS for Security Applications

Introduction

The integration of Pix4D with RTK (Real-Time Kinematic) GPS technology presents a formidable solution for high-precision mapping and surveying. This technical combination is particularly advantageous in various security contexts, including Executive Protection, Cybersecurity, Homeland Security, Surveillance & Surveillance Detection, and tactical operations in high-threat environments.

Key Advantages

  1. High Precision and Accuracy: RTK GPS provides centimeter-level accuracy, crucial for detailed mapping and surveying in security operations.
  2. Real-Time Data Processing: Pix4D’s software suite allows for real-time data processing and analysis, enabling rapid decision-making.
  3. Enhanced Situational Awareness: Detailed 3D maps and models enhance situational awareness and planning.
@cywf
cywf / IAM.md
Created May 23, 2024 18:59
Comprehensive Guide to Key, Certificate, and Secret Management

Comprehensive Guide to Key, Certificate, and Secret Management

Introduction

In today’s digital landscape, securing sensitive information is paramount. Organizations must adopt robust security practices to protect data integrity, confidentiality, and availability. This guide provides a comprehensive overview of essential aspects of key, certificate, and secret management, offering valuable insights into the design and architecture of these solutions, data security frameworks, cybersecurity governance models, cryptography, SSH key management, certificate management, and secret management solutions.

Each section includes detailed descriptions, interesting facts, use cases, and practical how-to guides, enabling you to implement these critical security measures effectively. Whether you’re an experienced professional or new to the field, this guide will equip you with the knowledge and tools necessary to enhance your organization’s security posture.


Bayesian Analysis: Practical Applications and Examples

Key Concepts

Bayes' Theorem: [ P(H|E) = \frac{P(E|H) \cdot P(H)}{P(E)} ]

  • ( P(H|E) ): Posterior probability
  • ( P(E|H) ): Likelihood
  • ( P(H) ): Prior probability

The KOCOA concept is a framework used in military planning and analysis to evaluate terrain and understand how it affects operations. It stands for Key Terrain, Observation and Fields of Fire, Cover and Concealment, Obstacles, and Avenues of Approach. In the context of Military Operations on Urbanized Terrain (MOUT), KOCOA is essential for understanding and navigating the complexities of urban environments. Here’s a detailed explanation of each component as it relates to MOUT:

KOCOA in MOUT

  1. Key Terrain

    • Definition: Key terrain is any location or area whose control gives a significant advantage to the force that holds it.
    • Urban Application: In an urban setting, key terrain could include high-rise buildings, bridges, intersections, or critical infrastructure like power plants or communication hubs. Controlling these areas can provide strategic advantages such as better observation points, control of movement, and logistical support.
  2. Observation and Fields of Fire

@cywf
cywf / sar.md
Created May 18, 2024 03:30
Synthetic Aperture Radar (SAR)

Coherent Change Detection (CCD) in Synthetic Aperture Radar (SAR)

What is CCD?

Coherent Change Detection (CCD) is a technique used in Synthetic Aperture Radar (SAR) to detect subtle changes in the ground surface or objects over time by analyzing the coherence of SAR data.

Principles of CCD

  • Interferometric Coherence: Measures the phase difference between two SAR images taken at different times from the same position. High coherence indicates little change, while low coherence suggests significant changes.
  • Temporal Baseline: The time interval between the two SAR images is crucial. Shorter intervals typically provide higher coherence and more sensitive change detection.
@cywf
cywf / common-trackers.md
Created February 14, 2024 16:22
A guide on how to disable common trackers and privacy infringing background services on iOS & Android

Disable Common Trackers & Privacy Infringing Background Services on iOS & Android

Introduction

Mobile devices constantly exchange data with various services, many of which track your activities and compromise your privacy. This guide outlines steps to disable common trackers and privacy-infringing background services on iOS and Android devices, helping you maintain control over your personal information.

iOS: Enhancing Privacy

Identifying and Disabling Trackers

@cywf
cywf / bitwarden.md
Created February 14, 2024 16:15
A guide on how to properly and securely setup Bitwarden for iOS and Android Devices

Setting up Bitwarden for iOS and Android Devices

Introduction

Bitwarden is a renowned open-source password manager that helps you store and manage your passwords in a secure vault. Using a password manager like Bitwarden not only simplifies managing your online credentials but significantly enhances your online security.

Installation

iOS

@cywf
cywf / proton-vpn.md
Created February 14, 2024 16:10
A guide on how to setup ProtonVPN on iOS and Android Devices

Setting up ProtonVPN on iOS and Android Devices

Introduction

ProtonVPN is a highly secure VPN service that prioritizes privacy and security for its users. Using a VPN like ProtonVPN is essential for protecting your online activities from eavesdropping, especially on unsecured Wi-Fi networks, and for bypassing geo-restrictions.

Installation

iOS

@cywf
cywf / brave-browser.md
Created February 14, 2024 16:02
A gist guide on how to properly setup Brave Browser securely on iOS & Android

Setting up Brave Browser on iOS & Android

Introduction

Brave Browser is a fast, private, and secure web browser for iOS and Android. It comes with built-in features to block ads and trackers, making your browsing experience more secure and private. This guide will walk you through setting up Brave Browser on your mobile devices, ensuring you're browsing securely from the start.

Installation

iOS

@cywf
cywf / geo-data-wazuh.md
Created February 11, 2024 20:41
Importing and Visualizing Geographical Threat Data in Wazuh SIEM

Importing and Visualizing Geographical Threat Data in Wazuh SIEM

This document provides a step-by-step guide on how to import external threat data, such as vulnerable devices identified by Shodan.io, and visualize it on a geographical map within Wazuh SIEM's OpenSearch Dashboards.

Prerequisites

  • Ensure that your Wazuh installation includes OpenSearch and OpenSearch Dashboards (formerly Elasticsearch and Kibana).
  • Obtain geographical threat data in JSON format with latitude and longitude information.

Step 1: Obtain and Prepare Data