Skip to content

Instantly share code, notes, and snippets.

View cywf's full-sized avatar
:shipit:
Tinkering

Kylo P cywf

:shipit:
Tinkering
View GitHub Profile
@cywf
cywf / cursorrules.md
Created January 28, 2025 21:32
A general use template for the .cursorrules file

PROJECT OVERVIEW

  • explain the project in a few sentences

PERSONALITY

  • explain your personality in a few sentences

TECH STACK

  • choose a tech stack with super popular languages
@cywf
cywf / cursor-ai-general-rules.md
Last active January 28, 2025 21:31
Cursor AI - Rules for AI - General Settings

Fundamental Principles

  • Write clean, simple, readable code
  • Implement features in the simplest possible way
  • Keep files small and focused (<200 lines)
  • Test after every meaningful change
  • Focus on core functionality before optimization
  • User clear, consistant naming
  • Think thoroughly before coding. Write 2-3 reasoning paragraphs
  • ALWAYS write simple, clean and modular code
  • User clear and easy-to-understand language, write in short sentences

🌍 Harvesting Energy from Space: A Bright Future for Earth

Space isn't just a frontier for exploration; it's a potential goldmine of clean, abundant energy that could revolutionize life on Earth. Imagine a future where energy is as cheap and plentiful as if we had an endless supply of oil—without the environmental drawbacks. This future could be closer than we think, thanks to the vast resources of our solar system. Here's how space could power our world:

🌞 Solar Power from Space

The Sun is the ultimate energy source, and space is the perfect place to harvest it. Solar power satellites (SPS) could collect sunlight 24/7, unaffected by Earth's night, weather, or atmosphere. These satellites could then beam energy back to Earth using microwaves, providing a constant stream of power to the grid. This technology, though still in its early stages, has the potential to dramatically lower energy costs and increase availability worldwide.

🚀 Challenges and Solutions

  • Launch Costs: Current es

🌌 Jobs in Space: The Frontier of Careers Beyond Earth 🌍

🚀 Introduction

The dream of working in space is no longer just for astronauts or science fiction enthusiasts. As space exploration and commercialization advance, the range of jobs in the space industry is expanding rapidly, offering opportunities for a diverse set of skills and interests. Whether you're a tech wizard, a STEM enthusiast, or someone with a knack for operations and logistics, there's a place for you in this cosmic adventure.

🌠 The Current Space Industry Landscape

1. Opportunities Abound

The space industry is booming, with a variety of roles beyond just rocket science. Organizations like NASA, SpaceX, and Blue Origin aren't just looking for engineers—they're also hiring for roles in customer service, legal, hospitality, and more. The need for STEM professionals is undeniable, but the industry is also opening doors for non-technical roles.

@cywf
cywf / proxmox-conf.md
Last active February 6, 2025 14:42
Guide for maintaining and configuring Proxmox
@cywf
cywf / 06122024.md
Created June 13, 2024 00:10
Maritime Security Incident June 12, 2024 US / RU

Threat Model: Russian Warships in the Caribbean

Step 1: Identify Assets

  1. Commercial and Military Maritime Vessels: Ships operating in the Caribbean, including U.S. and allied naval forces.
  2. Ports and Infrastructure: Key ports in Cuba, the U.S., and possibly Venezuela, along with associated logistics and refueling stations.
  3. Communication Networks: AIS, satellite communication, radio frequencies, and other maritime communication systems.
  4. Trade Routes: Major shipping lanes used for commercial and military logistics in the Caribbean.
  5. Geopolitical Stability: Diplomatic relations between the U.S., Russia, and Caribbean nations, especially Cuba and Venezuela.
@cywf
cywf / threat-hunting.md
Created June 12, 2024 23:15
Threat Hunting for the Next Generation

Introduction

In our tech-driven world, cybersecurity is essential. As technology becomes a bigger part of our lives, the need for experts to protect our digital spaces grows. One of the coolest roles in this field is threat hunting. It's a perfect fit for young people who love technology, solving puzzles, and making a real impact.

What is Threat Hunting?

Threat hunting is all about searching for cyber threats that might have slipped past an organization's defenses. Unlike traditional security roles that wait for alerts, threat hunters actively look for hidden dangers, investigate unusual activity, and understand hacker behavior. Think of it as a mix of detective work, problem-solving, and continuous learning.

Why Threat Hunting is Exciting

@cywf
cywf / intrinsic-motivators.md
Created June 12, 2024 04:13
Intrinsic Motivation

Intrinsic Motivation

Introduction

Science shows there's a hidden motivation switch located deep in the brain that unlocks a level of motivation more powerful than money, praise, or fame—one that practically forces your brain to crave doing the hard work you keep putting off.

The Struggle with Motivation

Picture this: you've set your alarm early, determined to start the day right. When it rings, you hit snooze repeatedly. Last night's enthusiasm has already evaporated, and the blanket weighs you down like a concrete slab. The day ahead feels like an enemy to avoid instead of a challenge to conquer.

@cywf
cywf / pix4d-rtk-gps.md
Last active May 31, 2024 05:56
Pix4D Combined with RTK GPS for Security Applications

Introduction

The integration of Pix4D with RTK (Real-Time Kinematic) GPS technology presents a formidable solution for high-precision mapping and surveying. This technical combination is particularly advantageous in various security contexts, including Executive Protection, Cybersecurity, Homeland Security, Surveillance & Surveillance Detection, and tactical operations in high-threat environments.

Key Advantages

  1. High Precision and Accuracy: RTK GPS provides centimeter-level accuracy, crucial for detailed mapping and surveying in security operations.
  2. Real-Time Data Processing: Pix4D’s software suite allows for real-time data processing and analysis, enabling rapid decision-making.
  3. Enhanced Situational Awareness: Detailed 3D maps and models enhance situational awareness and planning.
@cywf
cywf / IAM.md
Created May 23, 2024 18:59
Comprehensive Guide to Key, Certificate, and Secret Management

Comprehensive Guide to Key, Certificate, and Secret Management

Introduction

In today’s digital landscape, securing sensitive information is paramount. Organizations must adopt robust security practices to protect data integrity, confidentiality, and availability. This guide provides a comprehensive overview of essential aspects of key, certificate, and secret management, offering valuable insights into the design and architecture of these solutions, data security frameworks, cybersecurity governance models, cryptography, SSH key management, certificate management, and secret management solutions.

Each section includes detailed descriptions, interesting facts, use cases, and practical how-to guides, enabling you to implement these critical security measures effectively. Whether you’re an experienced professional or new to the field, this guide will equip you with the knowledge and tools necessary to enhance your organization’s security posture.