3583bytesready.com - Welcome, here come 3583 bytes - Ready?

Description: I’m back, baby! After a somewhat embarrassing amount of time tinkering in the shadows, it turns out I couldn’t stay away. For an overly detailed post-mortem of my digital hibernation and a peek at what’s been brewing in the meantime my New First Post is here. My old mothballed site So you’ve found my old mothballed site? Likely you were searching for Australian census information about the Statistical Linkage Keys, or how to scrape data with Python and Xpath?

Example domain paragraphs

There are many reasons you might need to isolate a PC or operating systems from a local network. For example, I often work on live malware and ransomware and I want to minimise the risk to the rest of my network.

Many types of malware (ransomware for example) will attack local network devices. As such, a live malware instance can compromise your internal network. It is essential that you protect yourself from the increased risk from the active infection inside your network.

Malware will also try to communicate with Command and Control (C2) servers. This communication can pass along all sorts of data and because the data comes from your local network, it can also reveal your real-world IP address. Perhaps not such a good idea when dealing with malicious actors.