top of page


What is IoT?: Internet of Things
The internet is no longer limited to phones, laptops, and gaming PCs running hot enough to cook ramen. Everyday objects are now connected too. Smart TVs, thermostats, refrigerators, doorbells, light bulbs, security cameras, watches, and even coffee makers can all connect to the internet. This massive network of connected devices is known as the Internet of Things, commonly shortened to IoT. At its core, IoT refers to physical devices that collect, send, and sometimes act on d

Samuel Cork
1 day ago2 min read


How to Enable Replay Buffer in OBS Studio
By default, OBS Studio does not have the Replay Buffer enabled. You will need to manually turn it on through the settings, as shown in the images below. First, look at the bottom-right corner of OBS Studio. You will see buttons such as Start Streaming and Start Recording. Next, click Settings, located near the bottom-right corner of the OBS window. Once the Settings menu opens, you will see a list of categories on the left side. Select Output. At the top of the Output setting

Samuel Cork
1 day ago1 min read


What is Browser Fingerprinting?
Browser Fingerprinting is a method of identifying and tracking a user or device by collecting and combining unique characteristics of their browser, system, and hardware, without relying on traditional identifiers like cookies. Why Browser Fingerprinting Can Be Dangerous You can be tracked without consent Websites can identify you across sessions and different sites without asking or notifying you. It defeats privacy tools Clearing cookies or using private browsing does not s

Samuel Cork
Apr 292 min read


Are Online Ads Dangerous? The Truth About Tracking and Privacy
The internet is not free. You are the product being sold. When you visit websites or use social media, it often costs you nothing upfront. No subscription. No payment. Just access. So how does that make you the product? Your interests, browsing history, and inferred personal data such as age, gender, and behavior can be collected and used to target you with ads. Not just on one website, but across the entire internet. Most people see ads and think, “These are annoying, I just

Samuel Cork
Apr 215 min read


Why I Removed Ads from CyberCorks
Ads are everywhere. Simply visiting a website to get information usually results in ads being shoved in your face. My site used to be the same way. People expect ads now and just tolerate the annoyance, but for me, it never sat right. Reason One: Irony I found having ads on my website to be ironic. An entire category of focus of CyberCorks is cybersecurity, teaching users how to stay safe and protect their data. At the same time, running ads from companies like Google, which

Samuel Cork
Apr 192 min read


Phishing Emails Are Getting Sloppy: Real Example Breakdown
I recently received an email claiming my website was about to be suspended. The message claimed to be from Wix, my website host, and used a strong sense of urgency to try and get my attention. Naturally, I took a closer look. And honestly… it was pretty funny. Phishing email claiming to be from WIX We can start from top to bottom of the email. You can see its a "Compliance Notice" Looking at the sender, it comes from wixreportsystem.help@gmail.com Yes really, sent from a

Samuel Cork
Apr 153 min read


What is a Cyberdeck?
A cyberdeck is a custom-built portable computer, usually designed with a rugged or cyberpunk-inspired look, often running Linux and built from modular or reused components. Instead of buying a finished device, you build it yourself using parts like: Single-board computers (Raspberry Pi, etc.) Small displays or repurposed laptop screens External keyboards Batteries and custom enclosures Spare parts It’s part computer, part DIY project, and part aesthetic statement. What Makes

Samuel Cork
Apr 83 min read


CyberCorks QR Code Generator Guide
CyberCorks QR Code Generator Guide The CyberCorks QR Code Generator is a fast, simple tool designed to do exactly what it sounds like: create QR codes instantly. Just enter your text or data into the input box, and the QR code updates in real time. Creating a Link QR Code To create a QR code that links to a website, simply paste your URL into the text box. The QR code will automatically update as you type. Once you're ready, you can download your QR code as a PNG, JPG, or WEB

Samuel Cork
Mar 242 min read


Spotting Scam Ads Online
Listen Mode – Audio Version When browsing online, you are bound to come across websites that may seem untrustworthy. Sometimes the site itself looks fine, but the ads or popups feel sketchy. This is extremely common and something every internet user should understand to stay safe. Websites, including this one, often display ads to generate revenue. These ads typically come from advertising networks such as Google or Amazon. However, that does not automatically mean the ads th

Samuel Cork
Feb 222 min read


The 2013 Target Data Breach: How One Email Took Down a Giant
Transcript In 2013 a single overlooked email resulted in a data breach at Target, stealing the data of up to one hundred and ten million customers. A simple attack — targeting not Target itself, but a small heating and air-conditioning company in Pennsylvania. An email so ordinary, nobody thought twice before opening it. Inside that message was malware — silent, patient, and designed to steal. And that single moment would become the doorway to one of the largest retail data b

Samuel Cork
Oct 28, 20254 min read


2017 Equifax Data Breach: How Equifax Let Hackers Walk Away with America’s Identity
Half of America had their identity stolen in 2017, and barely anyone talks about it. Equifax, one of the largest credit reporting agencies in the U.S., was breached by hackers. And this wasn’t just a basic leak. Equifax holds some of the most sensitive data in the country, Social Security numbers, birthdays, driver’s licenses, addresses, everything a hacker needs to steal your identity. In total? 147 million Americans were exposed. That’s nearly half the adult population of t

Samuel Cork
Oct 20, 20252 min read


Setting Up Active Directory Server
First, a virtual machine was created, running Windows Server with light compute components for demonstration only. Next step was to...

Samuel Cork
Sep 22, 20253 min read


Python Password Checker
This is a python code for a password grader. Typing in a password will put the password through multiple checks to see if it is strong....

Samuel Cork
Sep 22, 20252 min read


Refurbish and Reinforce Laptop
I took an outdated laptop and gave it a second life with Linux Mint XFCE, optimizing it for privacy, speed, and daily usability....

Samuel Cork
Sep 22, 20251 min read


Is AI Making Us "Dumber"?
Audio Version AI is a hot topic when it comes to human intelligence. On social media, it’s often described as “the end of us” or blamed for a loss of intelligence. Popular posts on platforms like TikTok point to sources claiming AI is proven to negatively affect our brains. CyberCorks Input: This isn’t the whole truth, though there is some merit to it. Many news articles and social media posts leave out key details, or just share the most sensational part for clicks and likes

Samuel Cork
Jun 24, 20252 min read


Privacy Boost for Linux: A Simple Guide to Firejail + Firetools
Audio Version Firetools is an application that uses Firejail to create a sandbox environment. Specifically, Firetools refers to the graphical user interface (GUI), while Firejail operates in the background to manage the sandboxing. A sandbox is a secure environment that isolates applications from accessing other data on your computer. This differs from a virtual machine, which runs an entirely separate Operating System (OS) within your computer. Think of it like a safe room f

Samuel Cork
Jun 6, 20252 min read


Does Incognito Mode Work? Understanding Google Incognito Mode
On Google Chrome, there is a feature called "Incognito Mode". Many users may use this feature to hide browsing history, stop cookies, or even stay hidden online. However, these same users do not fully understand how Incognito Mode works. Lets get into what Google's Incognito Mode does, and does not do. What Is Incognito Mode? Incognito mode is a feature in google that you can enable to have more private browsing. As seen in the image above, Google explains its ability and use

Samuel Cork
May 30, 20252 min read


Session Hijacking: What is it and How to Prevent It
Session Hijacking (also known as session stealing) is a common attack method used to take over a user's session. Taking over a session means the attacker (hacker) can impersonate you when you're logged into a website or application. This allows the attacker to perform any action you can, such as sending messages to your friends or accessing your private information, all without needing your password or MFA. What is Session Hijacking? Session Hijacking occurs when someone (typ

Samuel Cork
May 23, 20253 min read


Social Media Awareness: Discord Scammers after Tokens
Discord, a popular media platform, uses tokens to allow you to connect and stay connected to your account. This is a session token, and they often reset each session. This means if someone gets access to your Discord token, they essentially have access to your Discord account — no password needed. What Happens When Someone Gets Your Token? When someone else gets your token, they are then able to: Log into your account without needing your username or password. Bypass two-fact

Samuel Cork
May 18, 20253 min read


FCC Can Approve IoT Devices With Cyber Trust Mark.
A huge win for the cybersecurity community as well as for the security of all consumers. The FCC now must approve for Internet of Things (IoT) devices to meet security standards with the new Cyber Trust Mark. What is the Cyber Trust Mark? The Cyber Trust Mark is a new marking that IoT devices can Voluntarily agree to getting. This marking means that the device was sent to the FCC and inspected to meet high end security qualifications. If the IoT device has a FCC Cyber Trust M

Samuel Cork
Jan 8, 20252 min read
bottom of page