Chris Sanders πŸ”Ž 🧠(@chrissanders88) 's Twitter Profileg
Chris Sanders πŸ”Ž 🧠

@chrissanders88

Ed.D. | Founder @networkdefense @RuralTechFund | Former @Mandiant, DoD | Author: Intrusion Detection Honeypots, Practical Packet Analysis, Applied NSM

ID:15659876

linkhttps://chrissanders.org/links/ calendar_today30-07-2008 13:19:27

14,2K Tweets

31,9K Followers

505 Following

Chris Sanders πŸ”Ž 🧠(@chrissanders88) 's Twitter Profile Photo

Until you make the unconscious conscious, it will direct your life and you will call it fate.

What analysts do is far too important to be left up to fate. That's why we should understand how we think and how we bridge the gap from perception to reality in our investigations.

account_circle
Chris Sanders πŸ”Ž 🧠(@chrissanders88) 's Twitter Profile Photo

In this example, I...

1. Create a new file and get the MD5 hash
2. Add '1' to the file contents and get the hash again. Notice it's different!
3. I replace the contents of the file with the original text. Notice it's back to what it was originally!

In this example, I... 1. Create a new file and get the MD5 hash 2. Add '1' to the file contents and get the hash again. Notice it's different! 3. I replace the contents of the file with the original text. Notice it's back to what it was originally!
account_circle
Chris Sanders πŸ”Ž 🧠(@chrissanders88) 's Twitter Profile Photo

A file hash is a fixed-size cryptographic string that represents a file. It is a unique fingerprint of that file, which makes it a bit more reliable for identifying specific files. There's less abstraction from the file's purpose to its identifier than with a file name.

account_circle
Chris Sanders πŸ”Ž 🧠(@chrissanders88) 's Twitter Profile Photo

We've funded more Rural Tech Fund projects than I can ever remember by this stage in prior years. So many cool things happening in these rural tech classrooms that we can't wait to share. Our annual report from last year's work should be headed to the printer soon, as well!

account_circle