Skip to content
View laroper's full-sized avatar

Block or report laroper

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
laroper/README.md
  • 🖖🏾 Hi, I’m L.a.Roper -

    • ~\TECH'n\IT\10\THE\🌏︎
    • 🔬 ♥ Testing Software in Home-Lab 🧪
    • Everything 🌏pens❤urce
  • 👀 I’m interested in ==> TECH, FAITH, FAMILY, FRIENDS, FUN & FOOD

  • 📚 I’m currently learning ==> PYTHON

  • 💞️ I’m looking to collaborate on ==> ANYTHING THAT I CAN HELP ON

  • 📫 How to reach me ==> laropertech.me

  • ⚡ Fun fact: ==> "...because I live, ye shall live also" - John 14:19

    *********************************************************************

Pinned Loading

  1. linux-file-permissions linux-file-permissions Public

    Examine an existing permission of a file system. I was to check if permissions matched the authorization that should be given. If they didn’t match, I needed to modify the permissions to the approp…

  2. packet-capturing packet-capturing Public

    I performed tasks associated with using tcpdump to capture network traffic on a Linux virtual machine. I captured the data in a packet capture (p-cap) file and then examine the contents of the capt…

  3. python-file-update python-file-update Public

    An algorithm that updates a file that identifies employees who can access restricted content. The restrictions are based on their IP address. There is an allow list for IP addresses permitted to si…

    Python

  4. splunk-query splunk-query Public

    Using a trial Splunk Cloud account we will upload some default data to simulate a dummy organizaton. Using this test data we will be tasked with identifying whether there are any possible security …

  5. SQLfiltering SQLfiltering Public

    Ran SQL queries to retrieve information from a database called organization that contained two table log_in_attempts and employees. Also applied AND , OR and NOT operators to filter various SQL qu…

  6. suricata-rules suricata-rules Public

    To understand some alerts and logs generated by Suricata I will examine a rule and practice using Suricata to trigger alerts on network traffic. I'll also analyze log outputs, such as a fast.log an…