Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Decoding ROT using the Echo and Tr Command in the Terminal

December 29, 2011 Author: Category: Greg's Blog

In this tutorial we will use the ‘echo’ and ‘tr’ commands in order to encode and decode letters using ROT which is known as the Caesar Cipher. ROT means ROTation thus it is used to encode letters in the alphabet to its next letter. There are 25 possible ROT settings…

read more

Awareness Month: Just a Fading Echo

October 29, 2011 Author: Category: Greg's Blog

Plenty of Talk but Not Much ActionPlenty of talk but not much action. View full post on CUInfoSecurity.com Blogs RSS Syndication View full post on National Cyber Security

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved