27.01.2023
26.01.2023
23.01.2023
18.01.2023
09.01.2023
06.01.2023
05.01.2023
31.12.2022
28.12.2022
16.12.2022
02.12.2022
01.12.2022
29.11.2022
25.11.2022
24.11.2022
20.11.2022
16.11.2022
13.11.2022
11.11.2022
08.11.2022
06.11.2011
- Doug Lowe: Networking all-in-one for dummies
- Mark E. Fenner: Machine learning with Python for everyone
05.11.2022
03.11.2022
29.10.2022
28.10.2022
21.10.2022
19.10.2022
16.10.2022
- Rick Van Hattem: Mastering Python
- Cyber Defense Magazine – oct 2022
- Cyber Defense Magazine – jan 2019
07.10.2022
01.10.2022
30.09.2022
28.09.2022
25.09.2022
19.09.2022
14.09.2022
12.09.2022
09.09.2022
08.09.2022
Programming Cheat Sheets
- MakeUseOf: Arduino Commands
- MakeUseOf: HTML Essentials
- MakeUseOf: CSS Properties
- MakeUseOf: Javascript
- MakeUseOf: Python Reg Ex Shortcuts
- MakeUseOf: SQL Commands
- MakeUseOf: Visual Studio Code Shortcuts
- MakeUseOf: Raspberry Pi Commands
- MakeUseOf: List of helpful Windows alt codes
04.09.2022
01.09.2022
26.08.2022
19.08.2022
15.08.2022
02.08.2022
26.07.2022
- CyberEdge Group: 2022 Cyberthreat Defense Report
- Auditboard: Ransomware Prevention Checklist
- Dr. Nitin Paranjape: Efficiency Best Practises for Microsoft 365
- Custom PC: Retrograde
- Custom PC #228
07.07.2022
06.07.2022
- Sebastian Raschka – Vahid Mirjalili: Python Machine Learning
- Matthew Scarpino: TensorFlow for dummies
04.07.2022
01.07.2022
21.06.2022
10.06.2022
02.06.2022
23.05.2022
06.05.2022
05.05.2022
- Rob VandenBrink: Linux for Networking Professionals
- Brivo: Top Security Trends 2022
- Conscia: Ökade digitala risker efter cyberattackerna i Ukraina
04.05.2022
25.04.2022
22.04.2022
20.04.2022
15.04.2022
14.04.2022
08.04.2022
07.04.2022
- Chris Moschovitis: Privacy, regulations and cybersecurity
- Radware: Top DDoS attacks to prepare for
- Opensource.com: Git Cheat Sheet
01.04.2022
17.03.2022
16.03.2022
15.03.2022
11.03.2022
- John C. Shovik, Alan Simpson: Python for dummies
- CS kompendium: Tema – kompetensförsörjning
- CS kompendium: Tema – analytics
05.03.2022
04.03.2022
03.03.2022
02.03.2022
26.02.2022
24.02.2022
22.02.2022
17.02.2022
- Joseph MacMillan: Infosec Strategies and Best Practices
- Opensource.com: Installing applications on Linux
04.02.2022
29.01.2022
28.01.2022
27.01.2022
21.01.2022
13.01.2022
11.01.2022
07.01.2022
21.12.2021
17.12.2021
06.12.2021
- David Clinton: Linux Security Fundamentals
- LinuxTrainingAcademy.com: Systems logs and syslog standards
03.12.2021
30.11.2021
24.11.2021
- Christian Cawley: 26 uses of Raspberry Pi
- Cynet: The Dark Side of EDR
- Opensource.com: Raspberry Pi Cheat Sheet
- MakeUseOf: 99 Cryptocurrency Definitions
- GoalKicker.com: PowerShell Notes for Professionals
- GoalKicker.com: MySQL Notes for Professionals
20.11.2021
18.11.2021
- O’Reilly: Kubernetes Security and Observability
- MIT Technology Review: Preparing for AI-enabled cyberattacks
- MakeUseOf: How to study online
11.11.2021
10.11.2021
- Radware: Q3 2021 DDoS attack report
- GoalKicker.com: HTML5 Notes for Professionals
- GoalKicker.com: CSS Notes for Professionals
- GoalKicker.com: PHP Notes for Professionals
- GoalKicker.com: JavaScript Notes for Professionals
08.11.2021
05.11.2021
31.10.2021
- GoalKicker.com: Python Notes for Professionals
- GoalKicker.com: Algorithms Notes for Professionals
- Linode: HackerSploit – Docker Security Essentials
29.10.2021
28.10.2021
25.10.2021
24.10.2021
- Signiant: On-ramp to the Cloud
- Frost & Sullivan: Beyond the Cloud
- Beyond Identity: Passwordless Authentication
- Dave Gordon: TIP
17.10.2021
15.10.2021
10.10.2021
07.10.2021
24.09.2021
17.09.2021
15.09.2021
14.09.2021
07.09.2021
03.09.2021
Machine Learning
02.09.2021
- CISA: catalog of bad practises
- Shiva V. N. Parasram: Digital Forensics with Kali Linux
- Simple Mindfulness: 5 ways to destress under 2 min
27.08.2021
- ZDNet: Critical IoT security camera vulnerabilities
- LockBit ransomware with new techniques
- Fastcompany.com: Why workers are calling BS
- Opensource.com: A guide to Java serverless functions
- The Hacker News: Top 15 vulnerabilities attackers exploit to hack Linux
- ZDNet: Elon Musk is building a human-like robot
25.08.2021
- Microsoft Power Apps: 38 million records exposed
- Researchers warn of four emerging ransomware groups
- SpaceX ships 100 000 Starlink terminals
- Unit42-PaloAlto: Ransomware groups to watch – emerging threats
- Business news daily: Cybersecurity – a short business guide
- Code42: Building a budget for insider threat
- ITRS: Postpandemic challenges and a growing cyberthreat landscape
- Conscia: Så skyddar du dig när internet blir mörkt
- Crystal Panek – Wiley: Security fundamentals
16.08.2021
14.08.2021
13.08.2021
11.08.2021
- ZDNet: Hackers take $600m in biggest cryptocurrency theft
- ZDNet: Quantum computers could threaten blockchain security
13.07.2021
10.07.2021
09.07.2021
08.07.2021
07.07.2021
06.07.2021
- Dave McKay: Bash special characters
- Cloud exploitations with Kali Linux
- Predictables Success: Better team decisions
05.07.2021
- ZDNet: Kaseya urges customers to immediately shut down VSA servers
- Unit42 – PaloAlto: Threat brief – Kaseya VSA ransomware attacks
03.07.2021
- Radware: Choosing the Right DDoS Solution
- Radware: Six must-have SLA metrics
- CyberProof: The ultimate guide to automating your SOC
- Sam Horn: Why never to give another elevator speech
02.07.2021
- CyberArk – ISA Cybersecurity: Ransomware Exposed
- Valtix: The Cloud Architect’s Guide to Network Security
- Brendan Toner: Task Management for Project Managers
- Unit42 – PaloAlto: Network Attack Trends in feb – april 2021
01.07.2021
29.06.2021
26.06.2021
- Tim Rains: Cybersecurity threats, malware trends and strategies
- Code Corporation: Fighting viruses virtually and onsite
- Tugboat Logic: The ultimate survival guide to ISO 27001
- Mark Sunborn: High Impact Leadership
25.06.2021
- Radware: DDOS attacks against financial institutes
- Radware: Inspecting encrypted traffic
- 10 good reads from the Java Magazine archives
- Opensource.com: apt cheat sheet
24.06.2021
23.06.2021
- ZDNet: Ransomware peak. What next?
- Zendesk: Customer service gets conversational
- JFrog: Seven tips to DevSecOps solutions
- JFrog: GigaOm Radar for evaluating DevSecOps tools
- JFrog: Kubernetes Cheat Sheet
- Cisco 2nd Special Edition: Ransomware Defense for Dummies
22.06.2021
21.06.2021
- Forrester: Insider Risk Management
- Code42: Data Exposure Report Volume II 2021
- Unit42 – Palo Alto: Conti ransomware gang – an overview
- HackSpace #44
- Custom PC #215
20.06.2021
18.06.2021
- 101 Blockchains – Oracle: Enterprise Blockchains Predictions 2021
- SAS: Asissted Demand Planning using Machine Learning
17.06.2021
- Oracle: Java Magazine 10 years happy anniversary
- Unit42 – paloalto: Matanbuchus – Malware-as-a-service
- Sophos: Managed Threat Response
- Opensource.com: dnf cheat sheet
15.06.2021
- Radware research: The state of web application and API protection
- Computer Sweden kompendium: Tema IT i Vården
14.06.2021
12.06.2021
11.06.2021
10.06.2021
- Opensource.com: A practical guide to home automation
- Unit42 – paloalto: Prometheus Ransomware Gang, a group of REvil?
- ZDNet: Linux Foundation readies global covid certificate network
- ZDNet: Fastly’s global outage. Here’s what went wrong
- HPE: Proliant and synergy systems
09.06.2021
08.06.2021
- Red Hat Special Edition: Storage Patterns for Kubernetes
- Sophos: The state of ransomware 2021
- Unit42 – Palo Alto: Siloscape
07.06.2021
06.06.2021

- Nationaldagen svenska flaggans dag
04.06.2021
- Check Point Reasearch: Chinese Threat Group used new backdoor
- ZDNet: Chinese cybercriminals created backdoor to government
- Wireframe #51
- Göteborg 400 år
03.06.2021
- TechRepublic: Cybersecurity – Let’s get tactical
- Veritas: Ransomware Resiliency Research for the Nordics
- Opensource.com: Kubernetes for SREs and sysadmins
02.06.2021
01.06.2021
- Genesys: Journey mapping
- Palo Alto: techDocs – IoT security best practises
- Palo Alto: Best practises implementing zero trust
31.05.2021
29.05.2021
- Custom PC #214
- Flywheel: The business of webdesign
- Flywheel: The complete guide to SSL
- Flywheel: 7 services you can sell to skyrocket your revenue
28.05.2021
- AT&T Business: Security Operations Center
- Unit42 – Palo Alto: Wiped computer learing by digital forensics
- Unit42 – Palo Alto: Docker honeypot reveals cryptojacking
- The MagPi #106
- HackSpace #43
- Wireframe #48
- Wireframe #50
27.05.2021
26.05.2021
25.05.2021
24.05.2021
23.05.2021
20.05.2021
- ZDNet: Bizarro banking Trojan surges across Europe
- ZDNet: How long will hackers hide inside before ransomware attack?
- Sophos: The active adversary playbook 2021
- Skiforeningen: Kolsåstoppen
- Asrock iBOX-V2000M
18.05.2021
17.05.2021

- Gratulerer med dagen!
- Alt for Norge!
- Leve Norge!
15.05.2021
- ZDNet: Colonial Pipeline attack – Everything you need to know
- ZDNet: Python programming – Make the language twice as fast
- ZDNet: Bitcoin mining 101 – How to build a cryptomining rig
- Basefarm: Windows Virtual Desktop
- InData Labs: How AI and ML are revolutionizing healthcare
- Unit42: Ransomware Threat Report 2021
- TechRepublic: The Dark Web – a guide for business professionals
- TechRepublic: Launching a career in cybersecurity – an insider guide
- EC-Council: Certified Ethical Hacker v11 brochure
12.05.2021
11.05.2021
10.05.2021
07.05.2021
05.05.2021
02.05.2021
01.05.2021
- TechRepublic – ZDNet: A winning strategy for cybersecurity
- Neo4j Special Edition: Graph Data Science for Dummies
30.04.2021
29.04.2021
- Telia: 6 key trends reshaping data networking for business
- Opensource.com: GNU screen cheat sheet
- Jussi Björling sjunger Bacchanal 1933: -Jag vill leva, jag vill älska … ♪♫
27.04.2021
24.04.2021
23.04.2021
21.04.2021
20.04.2021
18.04.2021
13.04.2021
12.04.2021
09.04.2021
- Wireshark Tutorial: Examining Traffic from Hancitor Infections
- Canon: Säkerhet på arbetsplatsen
- Tanium: From Chaos To Clarity To Control
02.04.2021
- Wireframe #49
- InData Labs: AI in healthcare
- Ubuntu Server CLI pro tips
- Charles Dierbach: Introduction to computer science using Python
- Alienvault: 5 security controls
- Opensource.com: GNU grep cheat sheet
31.03.2021
- The Data Analysis Bureau: How to scale AI
- Opensource.com: Track aircraft with a Raspberry Pi
- Opensource.com: GNU sed cheat sheet
- Fake Websites Used in COVID-19 Themed Phishing Aacks, Impersonating Brands Like Pfizer and BioNTech
30.03.2021
29.03.2021
- Computer Sweden kompendium – Tema säkerhet: Därför talar alla om zero trust
- FBI Internet Crime Report 2020
21.03.2021
17.03.2021
05.03.2021
- Innhold til Custom PC #212
- Forrester Wave leader 2021
- Unit42: Kerberos KDC security feature bypass vulnerability
- Unit42: Wireshark Tutorial: Identifying hosts and users
- Opensource.com: GNU debugger cheat sheet
03.03.2021
01.03.2021
- HackSpace magazine #40 – Mar 2021
- The MagPi #101 – Jan 2021
- The MagPi #103 – Mar 2021
- Wireframe #46 – Jan 2021
26.02.2021
- Gartner: Innovation Insight for Extended Detection and Response
- Basefarm: Why you need a cloud managed service provider
- Steve Ranger: Meet the hackers who earn millions by saving the web
- Code42: Data Exposure Report 2021
25.02.2021
- Check Point: Cyber Security Report 2021
- Check Point: Secure Your Everything
- Basefarm: The Cloud Report 2020
- Opensource.com: A sysadmin’s guide to Bash scripting
- Sophos: Naked Security
- Formpipe: Long-term archive
- Formpipe: Lasernet Vault365
24.02.2021
21.02.2021
- Kulturstudion: Mirella Freni – Luciano Pavarotti i Puccini: La Bohème
- Mozart: Trollflöjten från Glyndebourne
19.02.2021
- TechRepublic: Snowflake Data Warehouse Platform Cheat Sheet
- Algolia: The guide to delightful voice search in media
- Splunk: Data Security Predictions 2021
- AWS – Intel: Running Windows Workloads on AWS
- Mitel: Fem trinn til bedre kundeservice
- Mitel: Kundeservice utfordringer i pandemi tider
18.02.2021
16.02.2021
15.02.2021
11.02.2021
- Java Magazine: The 25 best Java apps ever written
- Java Magazine: Programming the GPU in Java
- Java Magazine: Easy searching with elasticsearch
- Java Magazine: Inside Java 15 – Fourteen JEPs in five buckets
- Comparing Red Hat OpenStack Platform and Canonical’s Charmed OpenStack
10.02.2021
09.02.2021
08.02.2021
21.01.2021
17.01.2021
13.01.2021
- Carbonite + Webroot: Covid-19 CLICKS
- CS Tema säkerhet: Coronakrisen skapar nya hot
- Crime Laundering Primer: Inside Ryuk crime
11.01.2021
07.01.2021
05.01.2021
25.12.2020
24.12.2020
15.12.2020
13.12.2020
11.12.2020
- AT&T Cybersecurity: Insights report 10th edition
- CS kompendium: Tema – det digitala kontoret
- CS kompendium: Tema säkerhet – coronakrisen