Hello, Hoodies!
We have 3 weeks left in 2022! š„³
Hereās the breakdown of our Year End offers right now:
Network+ Challenge
Get your Network+ by the end of the year and get a FREE YEAR to the stack!
If you already paid for a full year up front (thank you!) Iāll give you a free custom hoodie.

Bootcamp Seat Giveaway
On Christmas Day, Iāll be selecting one random paid subscriber to the stack to win a FREE seat in Cohort 2 of the Zero to Hoodie Cybersecurity Bootcamp!
Every dollar you spend on the substack is a chance to win so upgrade to a PAID HOODIE in the STACK today:


Cohort 2 of the Zero to Hoodie Cybersecuirty Bootcamp!
This is my pride and joy!
Where the BULK of my time goes.
If youāre SERIOUS about starting your cybersecurity career in 2023 and you have the means, thereās absolutely no better product on the market. Period.
Live + recorded lectures
Live weekly Q&As
1v1 mentor meetings every month
24x7 discord access
With our mentorship, weāll give you THE BEST possible roadmap and course of action FOR YOU to MAXIMIZE your entry into the marketplace.
And if you sign up today, youāll get an ADDITIONAL 3 WEEKS of mentorship!
Thatās an extra 20% of the bootcamp FOR FREE.
This is my thank you for supporting me early and often.
You can wait till New Yearās Day to buy but youāll miss out on a lot of FREE time (if seats are even still available).
Seats are going FAST and space is limited!
The choice is yours.
Cohort 2 starts January 2nd.
Use discount code ā10Kā at checkout for $2,000 off!
Now letās dive into todayās topic.
A guest post!
As always, this is for educational purposes only, and BE CAREFUL when running commands from the terminal on your machines!
Letās dive in!
A Practical Guide to File EncryptionĀ Ā
The last post was a brief introduction to what encryption is. This post will present the tools at ourĀ disposal to actually encrypt files.Ā
Since all operations will be carried out on the terminal we will make extensive use of Cyberās postĀ about bash, make sure to read that one first from A to Z so you can actually implement thisĀ material (itāll also work on Mac). Reading the posts about backups and password managers isĀ also advised.Ā
We will be using five tools for file encryption: GPG, Age, Openssl, VeraCrypt and AppleĀ Macintoshās built-in disk image creation. There are others, but those are more than enough. WeĀ will do symmetric encryption first, then public-key encryption. So, without further ado⦠leggo!Ā