15.05.2023
08.05.2023
04.05.2023
03.05.2023
01.05.2023
23.04.2023
20.04.2023
14.04.2023
11.04.2023
07.04.2023
23.03.2023
17.03.2023
10.03.2023
06.03.2023
27.02.2023
24.02.2023
22.02.2023
14.02.2023
03.02.2023
27.01.2023
26.01.2023
23.01.2023
18.01.2023
09.01.2023
06.01.2023
05.01.2023
31.12.2022
28.12.2022
16.12.2022
02.12.2022
01.12.2022
29.11.2022
25.11.2022
24.11.2022
20.11.2022
16.11.2022
13.11.2022
11.11.2022
08.11.2022
06.11.2011
- Doug Lowe: Networking all-in-one for dummies
- Mark E. Fenner: Machine learning with Python for everyone
05.11.2022
03.11.2022
29.10.2022
28.10.2022
21.10.2022
19.10.2022
16.10.2022
- Rick Van Hattem: Mastering Python
- Cyber Defense Magazine – oct 2022
- Cyber Defense Magazine – jan 2019
07.10.2022
01.10.2022
30.09.2022
28.09.2022
25.09.2022
19.09.2022
14.09.2022
12.09.2022
09.09.2022
08.09.2022
Programming Cheat Sheets
- MakeUseOf: Arduino Commands
- MakeUseOf: HTML Essentials
- MakeUseOf: CSS Properties
- MakeUseOf: Javascript
- MakeUseOf: Python Reg Ex Shortcuts
- MakeUseOf: SQL Commands
- MakeUseOf: Visual Studio Code Shortcuts
- MakeUseOf: Raspberry Pi Commands
- MakeUseOf: List of helpful Windows alt codes
04.09.2022
01.09.2022
26.08.2022
19.08.2022
15.08.2022
02.08.2022
26.07.2022
- CyberEdge Group: 2022 Cyberthreat Defense Report
- Auditboard: Ransomware Prevention Checklist
- Dr. Nitin Paranjape: Efficiency Best Practises for Microsoft 365
- Custom PC: Retrograde
- Custom PC #228
07.07.2022
06.07.2022
- Sebastian Raschka – Vahid Mirjalili: Python Machine Learning
- Matthew Scarpino: TensorFlow for dummies
04.07.2022
01.07.2022
21.06.2022
10.06.2022
02.06.2022
23.05.2022
06.05.2022
05.05.2022
- Rob VandenBrink: Linux for Networking Professionals
- Brivo: Top Security Trends 2022
- Conscia: Ökade digitala risker efter cyberattackerna i Ukraina
04.05.2022
25.04.2022
22.04.2022
20.04.2022
15.04.2022
14.04.2022
08.04.2022
07.04.2022
- Chris Moschovitis: Privacy, regulations and cybersecurity
- Radware: Top DDoS attacks to prepare for
- Opensource.com: Git Cheat Sheet
01.04.2022
17.03.2022
16.03.2022
15.03.2022
11.03.2022
- John C. Shovik, Alan Simpson: Python for dummies
- CS kompendium: Tema – kompetensförsörjning
- CS kompendium: Tema – analytics
05.03.2022
04.03.2022
03.03.2022
02.03.2022
26.02.2022
24.02.2022
22.02.2022
17.02.2022
- Joseph MacMillan: Infosec Strategies and Best Practices
- Opensource.com: Installing applications on Linux
04.02.2022
29.01.2022
28.01.2022
27.01.2022
21.01.2022
13.01.2022
11.01.2022
07.01.2022
21.12.2021
17.12.2021
06.12.2021
- David Clinton: Linux Security Fundamentals
- LinuxTrainingAcademy.com: Systems logs and syslog standards
03.12.2021
30.11.2021
24.11.2021
- Christian Cawley: 26 uses of Raspberry Pi
- Cynet: The Dark Side of EDR
- Opensource.com: Raspberry Pi Cheat Sheet
- MakeUseOf: 99 Cryptocurrency Definitions
- GoalKicker.com: PowerShell Notes for Professionals
- GoalKicker.com: MySQL Notes for Professionals
20.11.2021
18.11.2021
- O’Reilly: Kubernetes Security and Observability
- MIT Technology Review: Preparing for AI-enabled cyberattacks
- MakeUseOf: How to study online
11.11.2021
10.11.2021
- Radware: Q3 2021 DDoS attack report
- GoalKicker.com: HTML5 Notes for Professionals
- GoalKicker.com: CSS Notes for Professionals
- GoalKicker.com: PHP Notes for Professionals
- GoalKicker.com: JavaScript Notes for Professionals
08.11.2021
05.11.2021
31.10.2021
- GoalKicker.com: Python Notes for Professionals
- GoalKicker.com: Algorithms Notes for Professionals
- Linode: HackerSploit – Docker Security Essentials
29.10.2021
28.10.2021
25.10.2021
24.10.2021
- Signiant: On-ramp to the Cloud
- Frost & Sullivan: Beyond the Cloud
- Beyond Identity: Passwordless Authentication
- Dave Gordon: TIP
17.10.2021
15.10.2021
10.10.2021
07.10.2021
24.09.2021
17.09.2021
15.09.2021
14.09.2021
07.09.2021
03.09.2021
Machine Learning
02.09.2021
- CISA: catalog of bad practises
- Shiva V. N. Parasram: Digital Forensics with Kali Linux
- Simple Mindfulness: 5 ways to destress under 2 min
27.08.2021
- ZDNet: Critical IoT security camera vulnerabilities
- LockBit ransomware with new techniques
- Fastcompany.com: Why workers are calling BS
- Opensource.com: A guide to Java serverless functions
- The Hacker News: Top 15 vulnerabilities attackers exploit to hack Linux
- ZDNet: Elon Musk is building a human-like robot
25.08.2021
- Microsoft Power Apps: 38 million records exposed
- Researchers warn of four emerging ransomware groups
- SpaceX ships 100 000 Starlink terminals
- Unit42-PaloAlto: Ransomware groups to watch – emerging threats
- Business news daily: Cybersecurity – a short business guide
- Code42: Building a budget for insider threat
- ITRS: Postpandemic challenges and a growing cyberthreat landscape
- Conscia: Så skyddar du dig när internet blir mörkt
- Crystal Panek – Wiley: Security fundamentals
16.08.2021
14.08.2021
13.08.2021
11.08.2021
- ZDNet: Hackers take $600m in biggest cryptocurrency theft
- ZDNet: Quantum computers could threaten blockchain security
13.07.2021
10.07.2021
09.07.2021
08.07.2021
07.07.2021
06.07.2021
- Dave McKay: Bash special characters
- Cloud exploitations with Kali Linux
- Predictables Success: Better team decisions
05.07.2021
- ZDNet: Kaseya urges customers to immediately shut down VSA servers
- Unit42 – PaloAlto: Threat brief – Kaseya VSA ransomware attacks
03.07.2021
- Radware: Choosing the Right DDoS Solution
- Radware: Six must-have SLA metrics
- CyberProof: The ultimate guide to automating your SOC
- Sam Horn: Why never to give another elevator speech
02.07.2021
- CyberArk – ISA Cybersecurity: Ransomware Exposed
- Valtix: The Cloud Architect’s Guide to Network Security
- Brendan Toner: Task Management for Project Managers
- Unit42 – PaloAlto: Network Attack Trends in feb – april 2021
01.07.2021
29.06.2021
26.06.2021
- Tim Rains: Cybersecurity threats, malware trends and strategies
- Code Corporation: Fighting viruses virtually and onsite
- Tugboat Logic: The ultimate survival guide to ISO 27001
- Mark Sunborn: High Impact Leadership
25.06.2021
- Radware: DDOS attacks against financial institutes
- Radware: Inspecting encrypted traffic
- 10 good reads from the Java Magazine archives
- Opensource.com: apt cheat sheet
24.06.2021
23.06.2021
- ZDNet: Ransomware peak. What next?
- Zendesk: Customer service gets conversational
- JFrog: Seven tips to DevSecOps solutions
- JFrog: GigaOm Radar for evaluating DevSecOps tools
- JFrog: Kubernetes Cheat Sheet
- Cisco 2nd Special Edition: Ransomware Defense for Dummies
22.06.2021
21.06.2021
- Forrester: Insider Risk Management
- Code42: Data Exposure Report Volume II 2021
- Unit42 – Palo Alto: Conti ransomware gang – an overview
- HackSpace #44
- Custom PC #215
20.06.2021
18.06.2021
- 101 Blockchains – Oracle: Enterprise Blockchains Predictions 2021
- SAS: Asissted Demand Planning using Machine Learning
17.06.2021
- Oracle: Java Magazine 10 years happy anniversary
- Unit42 – paloalto: Matanbuchus – Malware-as-a-service
- Sophos: Managed Threat Response
- Opensource.com: dnf cheat sheet
15.06.2021
- Radware research: The state of web application and API protection
- Computer Sweden kompendium: Tema IT i Vården
14.06.2021
12.06.2021
11.06.2021
10.06.2021
- Opensource.com: A practical guide to home automation
- Unit42 – paloalto: Prometheus Ransomware Gang, a group of REvil?
- ZDNet: Linux Foundation readies global covid certificate network
- ZDNet: Fastly’s global outage. Here’s what went wrong
- HPE: Proliant and synergy systems
09.06.2021
08.06.2021
- Red Hat Special Edition: Storage Patterns for Kubernetes
- Sophos: The state of ransomware 2021
- Unit42 – Palo Alto: Siloscape
07.06.2021
06.06.2021

- Nationaldagen svenska flaggans dag
04.06.2021
- Check Point Reasearch: Chinese Threat Group used new backdoor
- ZDNet: Chinese cybercriminals created backdoor to government
- Wireframe #51
- Göteborg 400 år
03.06.2021
- TechRepublic: Cybersecurity – Let’s get tactical
- Veritas: Ransomware Resiliency Research for the Nordics
- Opensource.com: Kubernetes for SREs and sysadmins
02.06.2021
01.06.2021
- Genesys: Journey mapping
- Palo Alto: techDocs – IoT security best practises
- Palo Alto: Best practises implementing zero trust
31.05.2021
29.05.2021
- Custom PC #214
- Flywheel: The business of webdesign
- Flywheel: The complete guide to SSL
- Flywheel: 7 services you can sell to skyrocket your revenue
28.05.2021
- AT&T Business: Security Operations Center
- Unit42 – Palo Alto: Wiped computer learing by digital forensics
- Unit42 – Palo Alto: Docker honeypot reveals cryptojacking
- The MagPi #106
- HackSpace #43
- Wireframe #48
- Wireframe #50
27.05.2021
26.05.2021
25.05.2021
24.05.2021
23.05.2021
20.05.2021
- ZDNet: Bizarro banking Trojan surges across Europe
- ZDNet: How long will hackers hide inside before ransomware attack?
- Sophos: The active adversary playbook 2021
- Skiforeningen: Kolsåstoppen
- Asrock iBOX-V2000M
18.05.2021
17.05.2021

- Gratulerer med dagen!
- Alt for Norge!
- Leve Norge!
15.05.2021
- ZDNet: Colonial Pipeline attack – Everything you need to know
- ZDNet: Python programming – Make the language twice as fast
- ZDNet: Bitcoin mining 101 – How to build a cryptomining rig
- Basefarm: Windows Virtual Desktop
- InData Labs: How AI and ML are revolutionizing healthcare
- Unit42: Ransomware Threat Report 2021
- TechRepublic: The Dark Web – a guide for business professionals
- TechRepublic: Launching a career in cybersecurity – an insider guide
- EC-Council: Certified Ethical Hacker v11 brochure
12.05.2021
11.05.2021
10.05.2021
07.05.2021
05.05.2021
02.05.2021
01.05.2021
- TechRepublic – ZDNet: A winning strategy for cybersecurity
- Neo4j Special Edition: Graph Data Science for Dummies
30.04.2021
29.04.2021
- Telia: 6 key trends reshaping data networking for business
- Opensource.com: GNU screen cheat sheet
- Jussi Björling sjunger Bacchanal 1933: -Jag vill leva, jag vill älska … ♪♫
27.04.2021
24.04.2021
23.04.2021
21.04.2021
20.04.2021
18.04.2021
13.04.2021
12.04.2021
09.04.2021
- Wireshark Tutorial: Examining Traffic from Hancitor Infections
- Canon: Säkerhet på arbetsplatsen
- Tanium: From Chaos To Clarity To Control
02.04.2021
- Wireframe #49
- InData Labs: AI in healthcare
- Ubuntu Server CLI pro tips
- Charles Dierbach: Introduction to computer science using Python
- Alienvault: 5 security controls
- Opensource.com: GNU grep cheat sheet
31.03.2021
- The Data Analysis Bureau: How to scale AI
- Opensource.com: Track aircraft with a Raspberry Pi
- Opensource.com: GNU sed cheat sheet
- Fake Websites Used in COVID-19 Themed Phishing Aacks, Impersonating Brands Like Pfizer and BioNTech
30.03.2021
29.03.2021
- Computer Sweden kompendium – Tema säkerhet: Därför talar alla om zero trust
- FBI Internet Crime Report 2020
21.03.2021
17.03.2021
05.03.2021
- Innhold til Custom PC #212
- Forrester Wave leader 2021
- Unit42: Kerberos KDC security feature bypass vulnerability
- Unit42: Wireshark Tutorial: Identifying hosts and users
- Opensource.com: GNU debugger cheat sheet
03.03.2021
01.03.2021
- HackSpace magazine #40 – Mar 2021
- The MagPi #101 – Jan 2021
- The MagPi #103 – Mar 2021
- Wireframe #46 – Jan 2021
26.02.2021
- Gartner: Innovation Insight for Extended Detection and Response
- Basefarm: Why you need a cloud managed service provider
- Steve Ranger: Meet the hackers who earn millions by saving the web
- Code42: Data Exposure Report 2021
25.02.2021
- Check Point: Cyber Security Report 2021
- Check Point: Secure Your Everything
- Basefarm: The Cloud Report 2020
- Opensource.com: A sysadmin’s guide to Bash scripting
- Sophos: Naked Security
- Formpipe: Long-term archive
- Formpipe: Lasernet Vault365
24.02.2021
21.02.2021
- Kulturstudion: Mirella Freni – Luciano Pavarotti i Puccini: La Bohème
- Mozart: Trollflöjten från Glyndebourne
19.02.2021
- TechRepublic: Snowflake Data Warehouse Platform Cheat Sheet
- Algolia: The guide to delightful voice search in media
- Splunk: Data Security Predictions 2021
- AWS – Intel: Running Windows Workloads on AWS
- Mitel: Fem trinn til bedre kundeservice
- Mitel: Kundeservice utfordringer i pandemi tider
18.02.2021
16.02.2021
15.02.2021
11.02.2021
- Java Magazine: The 25 best Java apps ever written
- Java Magazine: Programming the GPU in Java
- Java Magazine: Easy searching with elasticsearch
- Java Magazine: Inside Java 15 – Fourteen JEPs in five buckets
- Comparing Red Hat OpenStack Platform and Canonical’s Charmed OpenStack
10.02.2021
09.02.2021
08.02.2021
21.01.2021
17.01.2021
13.01.2021
- Carbonite + Webroot: Covid-19 CLICKS
- CS Tema säkerhet: Coronakrisen skapar nya hot
- Crime Laundering Primer: Inside Ryuk crime
11.01.2021
07.01.2021
05.01.2021
25.12.2020
24.12.2020
15.12.2020
13.12.2020
11.12.2020
- AT&T Cybersecurity: Insights report 10th edition
- CS kompendium: Tema – det digitala kontoret
- CS kompendium: Tema säkerhet – coronakrisen