Skip to content

Instantly share code, notes, and snippets.

View jaywon's full-sized avatar

Jason Sewell jaywon

View GitHub Profile
@jaywon
jaywon / Dockerfile
Last active April 9, 2018 11:28
Files used in Docker demo here: https://youtu.be/MncPj2ZHnD0
FROM alpine:latest
COPY writer.sh .
CMD ["/writer.sh"]
@jaywon
jaywon / auth.js
Last active November 13, 2017 20:23
Just Another Way
const allowedStatus = ['artist', 'client', 'shop'];
const authorizeUser = (req, res, next) => {
let Model;
if(!allowedStatus.includes(req.body.status)){
res.status(422).json("Credentials don't match");
}
if(req.body.status === 'artist'){
fetch('http://islandpulse.org/api/usage?limit=6')
.then(function(response) { return response.json(); })
.then(function(data) {
var chart = c3.generate({
bindto: '#chart',
data: {
json: data,
keys: {
// x: 'name', // it's possible to specify 'x' when category axis
value: ['energy_usage']
@jaywon
jaywon / README.md
Created October 19, 2017 05:54
Static Site Hosting Setup and Deployment with AWS CLI

Create Bucket

aws s3api create-bucket --bucket website-bucket-name --region us-west-2 --acl public-read --create-bucket-configuration LocationConstraint=us-west- 2

Make Bucket A Static Website

aws s3 website s3://website-bucket-name/ --index-document index.html --error-document error.html

Sync Local Project Directory to Static Website Bucket

aws s3 sync projectfolder s3://website-bucket-name --acl public-read

@jaywon
jaywon / README.md
Last active March 24, 2021 08:07
Things That I Realized I Suck At and Why Freelancing Sucks.....But How I Got Better

Things That I Realized I Suck At and Why Freelancing Sucks

  1. Estimating Sucks
  2. Collecting Money Sucks
  3. Email Sucks
  4. Defining Requirements Sucks
  5. Doing the Jobs of Five Peopls Sucks
  6. Clients (Can Sometimes) Suck
  7. Not Knowing Your Own Worth Sucks
  8. Working Alone Sucks
  9. Self Assessment Is Hard
@jaywon
jaywon / AWS_CLI.md
Last active October 13, 2017 05:19
AWS CLI Notes

S3

Create a bucket outside of us-east-1 requires the additional LocationConstraint configuration parameter

aws s3api create-bucket --bucket bucket-name --region us-west-2 --profile profile-name --acl private --create-bucket-configuration LocationConstraint=us-west-2

@jaywon
jaywon / README.md
Last active October 10, 2017 17:37
Notes from HackerOne "Why Executives Underinvest in Cybersecurity" Webinar
    • Behavioral Science Overview by Alex Blau from Idea 42
    • http://www.ideas42.org/about-us/people/#407
    • Idea 42 is a non-prof for analyzing behavioral science in decision making(look into further)
    • Underinvesting or mis-investing in cybersecurity by executives...why?
    • People assume that people act logically, in reality make odd decisions
    • Decisions aren't about the person but the context of when that decision was made
    • CEO and CISO don't always speak the same language, different interests and concerns
    • CISO should be able to articulate risks in the business case and not the technical case
      • Make an CYBER problem an ORGANIZATION problem
  • Cybersecurity experts probably think in very complex mental models
@jaywon
jaywon / README.md
Last active September 12, 2017 03:50
Cyber Prep - Day 5
@jaywon
jaywon / README.md
Last active September 6, 2017 19:28 — forked from theRemix/README.md
Networking Research Assignment

Answer these questions

In a sentence, or short paragraph form answer these questions in your own words.

What is your current local ip address?

How did you obtain your local ip address?

What is your network address?

@jaywon
jaywon / README.md
Last active September 6, 2017 19:21
TCP/IP Protocol Research Assignment

What The Stack?

Networks, the Internet, and the technology that surrounds our every day lives are made up of sets of defined rules and predictable behaviors. These standards are called protocols. These are often time the areas of focus where technology can be exploited for vulnerabilities and a thorough understanding of the contracts of technology can help us secure, monitor and exploit these systems.

A true cybersecurity professional understands technology at these fundamental levels and allows them to think critically about securing and testing systems.

Your Mission

  1. Research the TCP and IP protocols
  2. Find 5 video resources that helped you understand the subject matter
  3. Find 5 written resources that helped you understand the subject matter
  4. Be prepared to share your materials and approach with your peers for why these materials were helpful for you and any insights from your research