TEK or DIE

Are Tech Job Influencers Lying To You?

Renita and I had a blunt discussion about what to look out for when evaluating a course offered by a tech job influencer. We discussed our perspectives on what we uncovered during our research for this episode. We also discus...

Play Episode

Recent

April 22, 2024

Are Tech Job Influencers Lying To You?

Renita and I had a blunt discussion about what to look out for when evaluating a course offered by a tech job influencer. We discussed our perspectives on what we uncovered during our research for this episode. We also discu…
April 1, 2024

How To Use AI To Create Legit Side Hustles

Ever thought about diving into the world of AI to make some extra cash on the side? Well, you're in luck because in our latest episode, Ebony and John break down how people are using AI to create side hustles! Do you want to…
Oct. 6, 2023

Applying for a Tech Sales Engineer Job? Learn How to Follow-Up for a $120,000 Interview

🚀 Are you considering applying for a Tech Sales Engineer job? In this video, I’m diving into the art of following up after applying for a Tech Sales Engineer job. This is to increase the odds of snagging an interview. W…
Sept. 27, 2023

What does pre-sales mean as a sales engineer? ($120K) #presales #shorts

🧠💡 Tech Guru + Problem Solver = Pre-Sales Prosperity! 💼💰 Another day, another dollar! Happy Wednesday people. 👋 Let's dive into the winning formula for making it BIG in the world of pre-sales engineering. 🌐🚀 In this fast-pa…
Sept. 26, 2023

Interview Landing Tips for $100K Tech Pre-Sales Engineer Jobs #shorts #presales

🚀 Want to stand out in the job hunt? It's time to get CLEVER! 🤓✨ You've sent in your application, but your journey doesn't end there. Following up is the secret sauce! 💌💼 Here's how: 📝 Craft an impressive resume. 🚀 Showcase…
Sept. 25, 2023

120,000 Tech Pre-Sales Engineer Job Coming Soon (That's Base Salary) #shorts #presales

Ready to take your career to the next level? Subscribe to TEK or DIE's YouTube channel and podcast on Spotify or Apple Podcasts because we're dropping some 🔥 knowledge on the latest episode. Learn a game-changing tip that'…
Aug. 30, 2023

AI Crypto Fraud AND PONZI SCHEME??? #short #aicryptofraud #ponzischeme #podcast #cybersecurity

A snippet from the video Ebony and I have called "AI Crypto Fraud DeepFake CEO Tricks Investors Into Ponzi Scheme". We hope you you find the full video informative.
Aug. 28, 2023

AI Crypto Fraud DeepFake CEO Tricks Investors Into Ponzi Scheme

Ebony and I breakdown an alleged instance of deceptive mirage in the world of crypto investing. Ebony walks us through the company's alleged digital façade, revealing the shocking extent to which AI technology was used to al…
Aug. 2, 2023

How to Not Get Hacked at DEF CON 31

DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. Ebony and I break down how to enjoy DEF CON 31 without getting hacked.
July 29, 2023

Tricknology Report: 5 Mind-Blowing Cyberattack Stories

Ebony Nyenya and John Davy breakdown several recent mindblowing, brazen cyberattacks. The conversation was lit 🔥 (as always). Of course, you can expect to learn about how some of these attacks work, and what steps you can ta…
July 1, 2023

Using AI to Speak to Your Dead Parents

The loss of a loved one is an incredibly challenging experience. It has the potential to leave an indelible mark on our lives. The grieving process is complex, and finding closure can often be elusive. However, recent advanc…
June 25, 2023

The $1M Phishing King of DoorDash

In a recent case, a sophisticated phishing scam targeting DoorDash drivers led to the theft of over $950,000 in employee payments. The perpetrator employed clever tactics to exploit vulnerabilities within the popular food de…
June 19, 2023

So, You Just Got Your First IT Support Job. Part 1 #short

👋 Are you starting a new IT Support role or eager to break into the world of IT with limited experience? 🌟 🎙️ This episode is specially crafted just for you! I put together some invaluable insights to make your first IT sup…
June 17, 2023

You Just Got Your First IT Support Job. Now What?

Are you starting a new IT Support role or looking to break into the world of IT with limited experience? 🤔 This episode is tailor-made for you! Grab some coffee and get ready for some really valuable insights to make your f…
June 17, 2023

Rootkit Attacks: The Hidden Menace

When it comes to cybersecurity threats, rootkits occupy a prominent position due to their insidious nature. Rootkits are clandestine software packages that aim to gain unauthorized access and control over computers. What'…
June 11, 2023

Firewall Configuration Examples for Beginners

Firewalls are a fundamental component of network security. Understanding how Access Control Lists (ACLs) work is crucial for aspiring cybersecurity professionals.  In this review, I will delve into five ACL configurati…
June 7, 2023

Understanding Snapshots: A Solution for Backing Up Open Files

(Objective 2.5: Given a scenario, implement cybersecurity resilience.) In the world of data backup and recovery, one common challenge is dealing with open files. When critical data, such as SQL databases or Exchange messagi…
May 31, 2023

Demystifying Firewall Rules: 5 Key Insights for Cybersecurity Novices

In the realm of network security, firewall rules play a pivotal role in safeguarding systems from unauthorized access and potential threats. Understanding the fundamentals of firewall rules is essential for cybersecurity nov…
May 6, 2023

Restoration Order: The Key to Effective and Efficient Disaster Recovery

If you're studying for the CompTIA Security+ certification exam, you're likely familiar with the importance of having a disaster recovery plan in place to ensure business continuity in the face of an uncontrolled outage. Ho…

Recent Blog Posts

Rootkit Attacks: The Hidden Menace

When it comes to cybersecurity threats, rootkits occupy a prominent position due to their insidious nature. Rootkits are clandestine software packages that aim to gain unauthorized access and control over computers. What's even more scarier, is t…

Firewall Configuration Examples for Beginners

Firewalls are a fundamental component of network security. Understanding how Access Control Lists (ACLs) work is crucial for aspiring cybersecurity professionals.  In this review, I will delve into five ACL configurations commonly used by netw…

Understanding Snapshots: A Solution for Backing Up Open Files

(Objective 2.5: Given a scenario, implement cybersecurity resilience.) In the world of data backup and recovery, one common challenge is dealing with open files. When critical data, such as SQL databases or Exchange messaging systems, is constantly…