Articles by Marcus Johnson
Hands-On Guide to Post-Quantum Crypto in Python
Hands-on Python guide to Kyber hybrid KEM+AEAD using pyoqs and cryptography. Includes runnable code, prerequisites, troubleshooting — try locally.
Incident Response Plan: Cybersecurity Emergency Guide
Build an actionable incident response plan with SIEM queries, SOAR playbooks, backup scripts, and testing guidance. Implement improvements today.
Multi-Factor Authentication (MFA): Setup and Best Practices
Practical MFA setup for Google, Microsoft Entra, AWS and apps with code, Conditional Access examples, service-account guidance, and troubleshooting. S...
Zero Trust Security: Modern Network Protection Strategy
Practical Zero Trust Security guide with tools (Okta, OPA v0.50+, VMware NSX), examples, and troubleshooting. Start securing your network today.
Encryption Basics: AES, RSA, and Modern Cryptography
Learn AES-GCM, RSA key wrapping, hashing, and signature best practices with runnable Java and Node.js examples. Start securing apps today.
Penetration Testing Basics: Ethical Hacking Tutorial
Learn penetration testing basics, safe lab setup, tools (Nmap, Metasploit, Burp) and hands-on examples. Practice securely — follow step-by-step guidan...
Learn Advanced VPN Techniques: Split Tunneling & More
Master split tunneling, OpenVPN client configs, MFA, IDS integration, and kill-switches with hands-on commands and troubleshooting. Start securing VPN...
DDR5 vs DDR4 RAM: Performance Comparison and Upgrade Guide
Compare DDR5 vs DDR4 performance, compatibility, BIOS steps, benchmarks, and stability tips to decide on upgrading — read the practical upgrade guide.
Two-Factor Authentication (2FA): Complete Security Guide
Practical 2FA guide with Node.js, Python, WebAuthn examples, envelope encryption, bypass mitigations, and production hardening. Secure your apps today...
Learning VPN Basics: A Beginner's Guide
Learn VPN fundamentals, set up WireGuard (VPS + Windows client), secure key practices, and performance testing with step-by-step commands. Secure your...
Cybersecurity Basics: Protecting Yourself Online
Learn practical cybersecurity basics, incident-response steps, and privacy tips. Follow the checklist and secure your digital life today.
Buffer Overflow Attacks: Learning Guide for Beginners
Learn buffer overflow concepts with runnable C examples, ASan/Valgrind detection, and concrete prevention steps. Test safely — get started now.