Bigueur's Blogosphere

Life is art. Paint your own picture!

Skip to content
  • Cybersecurity
  • Insights
  • Film
  • Travel
    • Hotels & Resorts
    • Restaurants
  • Projects
  • Testimonials
  • About Me
Search

Month: May 2014

What is Art?

May 27, 2014May 31, 2014 / Miguel Bigueur / Leave a comment

p.php

I have a few paintings situated around my house so when guests enter they are greeted by the paintings in all their grandeur! I consider my paintings art because they are unique to the person who painted them and I see value in them. Continue reading →

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Blog Author

  • Miguel Bigueur
Follow Bigueur's Blogosphere on WordPress.com

Watch Mr. Robot on USA

Mr Robot

Search

Calendar

May 2014
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Feb   Jun »

Archives

Blog Community

Mr. Robot

My Tweets

Tag Cloud

80s Sound ACC file Advertising Al Pacino American Cinema attack vector Audio Compression Audio File Formats Baraka Bellagio Restaurants Best Asian Food Las Vegas Best Bass Player Best Las Vegas Steaks Brit Funk Brute Force Cafe Life Cafes Cloud Computing Coffee Culture Coffee Drinking Coffee Society cyber espionage Del Mar News Del Mar San Diego Editor Research Report Eisenstein’s Theories of Montage Eisenstein’s theory of Rhythmic Montage ESM Group Falling Down (1993) Film Editing Film Research Paper FTK Imager Gangs of New York Gangster films Gangster Genre Glen Gary Glen Ross Golf & Lifestyle Golfing Community Golfing Culture Golfing Lifestyle Golfing Taxonomies Grand Del Mar hardware keylogger Hollywood Opinions Hollywood Politics Horseshoe Bay Restaurants Housing Bubble Housing Market Incident Response Manager Intrusion detection system Level 42 Level 42 Sound Life on the Greens Lossy audio files Luxor Restaurants Luxor Steaks Mark King Media metasploit Metasploitable Miguel Bigueur Miguel Edited Mikhail Bakhtin MP3 file Multi Asian Cuisine mythical Hollywood gangster Network Security NIST nmap Noodles Bellagio Noodles Las Vegas Pathological Rationalism Phillippe Orriendy port scan Private Cloud Production Code Real Estate Bubble Realism vs. Formalism in Film Robert Warshow Ron Hyde Sacramento Kings security incident socialization Socio Political Influences software keylogger Spear Phishing Tender Steak The Boathouse The Boathouse Restaurant The Cabinet of Dr. Caligari The Grand Del Mar Thelma Shoonmaker Theory of Socialization vulnerability management Vulnerability scan Wally Badarou WAV file Wi-Fi Pineapple Wild B.C. Salmon wireshark

Gallery

image2
Wireless Network WiFi zone icon
Wireless Network WiFi zone icon
smart_home_communication_protocols
IMG_0364
NAVY Miguel 2
Wireshark
Cloud Computing
Russian-hackers-steal-turkish-citizens-data
Film-vs-Digital-600x336
Screen Shot 2014-05-24 at 12.07.51 PM
yaralogo
O05Pwjy
Screen Shot 2014-05-24 at 12.00.23 PM
IMG_1364
shawshank1_2772806b
patch-maint-dpc69328233-718x350
baraka-blue-ray_0.page
malware
Anonymous
burbuja-650x400
706d0297-e6ba-4c03-a35d-b950728fb0d3
Cybersecurity-israel
giphy
Screen Shot 2014-05-24 at 12.07.30 PM
usbForensics_GBHackers
data-protection
Un-chien-andalou
p.php
Incident coordinator pressing INCIDENT RESPONSE on an interactive touch screen. Computer security concept. Man in blue suit is highlighting an open lock among forensic tool icons signifying a breach.
Incident coordinator pressing INCIDENT RESPONSE on an interactive touch screen. Computer security concept. Man in blue suit is highlighting an open lock among forensic tool icons signifying a breach.
Policy
167907Steve-McQueen-Bullitt-Posters
whatever-happened-to-blu-ray
Advertising
Screen Shot 2014-05-24 at 12.07.24 PM
1on1schoonmaker8ef65301-27ac-4cc8-85da-603e1a26cf7f
MSDFUMO FE015
byod
Moving-to-cloud
62966_13201271115PM50474
nextgov-medium
the-dukes-apt29-one-of-russia-s-cyber-espionage-hacking-squads-492021-2
640_coffee
empty-hollywood-star-01
IC78017
china-internet-outage
burninrubber4
Cyber-Security-(2)
5ad1f-usb-device-forensics
Processor-CPU-Motherboard-Blue-Circuits-Circuit-Board-computer-wallpaper
Seven Steps
golfing
configuration-management-people
997DBR_Michael_Madsen_001
a6a29-no-mac-address
figure 1
figure 1
Anon
anthropology_dynamic_lead_slide
Mikhail_bakhtin
RISK
images
Screen Shot 2014-05-24 at 12.00.08 PM
pen-test2
TheDrownAttack-e1457092838437
2318318
Screen Shot 2014-05-24 at 12.08.26 PM
Internet-de-las-cosas-900x630
figure 1
figure 1
1
WEB APPS
email
WhatIsMethbot
Earth_Eastern_Hemisphere
gangster_4
Sold Home For Sale Sign & New House
Plan A B or C Choice Showing Strategy Change Or Dilemmas
Plan A B or C Choice Showing Strategy Change Or Dilemmas
TVP_VolatilityBlack
tumblr_m9l2vyUdC31retv03o1_1280
AES 256
dictionary-attack
12862sound_big
201402NIST-Cybersecurity-Framework-its-future-and-what-it-means-to-you
caligari_still2
level422
USS_Saratoga_(CV-60)_underway_1985
jJgjc
NAVY Miguel

RECENT POSTS

  • Hybrid Kill Chain & Attack Methodology December 3, 2017
  • Chinese APT Analysis “APT30” October 26, 2017
  • Russian APT Analysis “APT29, aka, The Dukes” October 20, 2017
  • Methbot “Russian Cybercime” September 24, 2017
  • Malware Analysis & Reverse Engineering (Case Study) August 20, 2017

RECENT COMMENTS

Jack Wells on USS Saratoga CV60 “Death…
Brandon Mitchell on USS Saratoga CV60 “Death…
David Ballard on USS Saratoga CV60 “Death…
What Are the Branche… on Wireless Forensics
Daniel R. Brass on USS Saratoga CV60 “Death…

Top Posts

  • Wireshark Packet Capture Analysis
    Wireshark Packet Capture Analysis
  • Chinese APT Analysis “APT30”
    Chinese APT Analysis “APT30”
  • The Spine of "Dog Day Afternoon - 1975"
    The Spine of "Dog Day Afternoon - 1975"
  • Denial of Service (SYN Flood Attack)
    Denial of Service (SYN Flood Attack)
  • Wireless Forensics
    Wireless Forensics
  • USB Forensics
    USB Forensics
  • Putter Panda Cyber Threat Intelligence Card
    Putter Panda Cyber Threat Intelligence Card

Blogs I Follow

  • Webhost Heavy
  • Kali Linux Hacking Tutorials
  • Kali Linux
  • Kali Linux Tutorial
  • LinuxInsider
  • Linux Journal - The Original Magazine of the Linux Community
  • RSS | Veracode Blog
  • Schneier on Security
  • Dark Reading
  • Dude Hacking Tricks & Updates
  • Maria Victoria Collazos
  • TechCrunch
  • 9to5Mac
  • Bigueur's Blogosphere
Blog at WordPress.com.
Webhost Heavy

Kali Linux Hacking Tutorials

Life is art. Paint your own picture!

Kali Linux

Kali Linux Tutorial

Life is art. Paint your own picture!

LinuxInsider

Life is art. Paint your own picture!

Linux Journal - The Original Magazine of the Linux Community

Life is art. Paint your own picture!

RSS | Veracode Blog

Life is art. Paint your own picture!

Schneier on Security

Life is art. Paint your own picture!

Dark Reading

Life is art. Paint your own picture!

Dude Hacking Tricks & Updates

Let’s Make Things Better.

Maria Victoria Collazos

MA Design for Film, TV and Events

TechCrunch

Startup and Technology News

9to5Mac

Apple News & Mac Rumors Breaking All Day

Bigueur's Blogosphere

Life is art. Paint your own picture!

  • Follow Following
    • Bigueur's Blogosphere
    • Already have a WordPress.com account? Log in now.
    • Bigueur's Blogosphere
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: