Negative PID
banner
negativepid.bsky.social
Negative PID
@negativepid.bsky.social
Digital Investigations | OSINT | SOCMINT | Due diligence
web: negativepid.com
blog: negativepid.blog
We confess. We love Stranger Things. With this post, we had a little fun debunking the Upside Down and the real science behind its concept. No spoilers included.

#strangerThings #UpsideDown #MKultra #quantumPhysics #neuroscience #sciFi

negativepid.blog/the-science-...
The science behind the Upside Down - PID Perspectives
After years of wait, Stranger Things's Season 5 - the closing chapter of the Hawkins' saga - is arriving on Netflix. There are many reasons to love the show,
negativepid.blog
December 18, 2025 at 12:00 AM
Pizzagate is the most obvious example that even the most unlikely claim can be believed if the misinformation campaign is well orchestrated. What is the role of algorithms in all this?

#misinformation #pizzagate #psychology #algorithms #socialmedia #politics

negativepid.blog/pizzagates-r...
Pizzagate’s role in viral disinformation - PID Perspectives
In the months leading up to the 2016 U.S. presidential election, a bizarre rumour began spreading across fringe corners of the internet. The claim? A
negativepid.blog
December 17, 2025 at 11:00 PM
It all began with a leaked report from the local police department: the unverified information ruined the reputation of a young teacher, fuelling rumours and speculation online. Then she was killed. Her case was never solved.

#socialMedia #rachelDelTondo

negativepid.blog/social-media...
Social media crimes: Rachel DelTondo - PID Perspectives
In the quiet town of Aliquippa, Pennsylvania, the 2018 murder of Rachel DelTondo shocked the community and quickly became the center of a media storm.
negativepid.blog
December 17, 2025 at 10:00 PM
The Christchurch Mosque shooting was an unprecedented "digital-first" terrorist act: the shooter live-streamed the attack on social media. Investigators had to learn how to respond to terror in the digital world and the physical world.

#socialMedia #Christchurch

negativepid.blog/the-christch...
The Christchurch mosque shooting - PID Perspectives
On March 15, 2019, in New Zealand, a gunman attacked two mosques in Christchurch during Friday prayers, killing 51 people. And he streamed it all in real time.
negativepid.blog
December 17, 2025 at 9:00 PM
How do you implement a least privilege access model strategy across different environments? Here's how to implement and enforce least privilege across Windows, Linux, and macOS, and automate audits and compliance checks using PowerShell, Bash, and Ansible.

#IAM

negativepid.blog/iam-designin...
IAM: designing a least privilege model - PID Perspectives
“Least privilege” is a security principles everyone agrees with, but few implement correctly. In practice, it’s about giving users just enough access.
negativepid.blog
December 17, 2025 at 6:40 PM
Either you want to test a website or you want to host it on your own server to have more control, here's how to do it step by step. In this demo, we have used UTM to host our Ubuntu Server.

#UbuntuServer #WordPress, #selfHosting #UTM #VirtualMachines #webHosting

negativepid.blog/how-to-insta...
How to install WordPress on a Linux VM – PID Perspectives
Whether you want to test a particular configuration or you want to self-host your website, installing a WordPress instance on Linux has lots of advantages. The good news is that it won’t cost you a dime, and once you have ironed out the process, it won’t even take you that long to go from zero to a full-blown working website running on your local network. Here’s how to get started. 
negativepid.blog
December 17, 2025 at 4:20 PM
The Silk Road was a dark web market that revolutionized illegal online operations. Run like a company, it sold illegal goods for millions. Its founder, the "Dread Pirate Roberts," was arrested and made an example of.

#cybercrime #theSilkRoad #darkWeb #darkMarkets

negativepid.blog/rise-and-fal...
Rise and fall of the Silk Road – PID Perspectives
In February 2011, a hidden website appeared on the Tor network with an unusual promise: a global bazaar where anyone could buy and sell illicit goods without fear of surveillance. Known as Silk Road, the site combined two emerging technologies: Tor hidden services for anonymity and Bitcoin for untraceable payments to build what was marketed as an unpoliceable marketplace.
negativepid.blog
December 17, 2025 at 2:00 PM
Time series analysis is an effective tool for cracking real-world crime cases. It's only one of the many techniques that we have explored during a police-led training5. Here's how we have added our spin using R.

#crimeAnalysis #timeSeriesAnalysis #CDR #callRecords

negativepid.blog/learning-tim...
Learning time series analysis through CDR – PID Perspectives
In January, I started attending police-led training on CDR analysis through the American Association of Crime Analysts. This topic is particularly fascinating for anyone with a background in working with telcos and their data, as records can contain all sorts of valuable information. Especially when it comes to solving crime through time series analysis. 
negativepid.blog
December 17, 2025 at 11:40 AM
When you study for your networking exams, TCP IP is taught as one of the building blocks of a network. However, few understand why it was created and the problem it was meant to solve.

#TCPIP #networking

negativepid.blog/vint-cerf-bo...
Vint Cerf, Bob Kahn, and TCP IP - PID Perspectives
When the first packet switching networks appeared in the late 1960s and early 1970s, they were isolated systems with their own rules and interfaces. Connecting
negativepid.blog
December 17, 2025 at 11:05 AM
Who was Hagbard Celine? This hacker handle, inspired by the character of a popular anarchist trilogy, was used by multiple hackers, but became famous for smuggling sensitive information to the Russians during the Cold War.

#HagbardCeline #hackers #coldWar

negativepid.blog/hagbard-celi...
Hagbard Celine, the KGB hacker – PID Perspectives
Hagbard Celine is one of the most mysterious figures in the hacker scene of the first generation. He has been the target of numerous myths and rumours, one of which involves espionage with the KGB and speculations about his disappearance. 
negativepid.blog
December 17, 2025 at 9:20 AM
The countdown to the holidays has started. If you want to add a touch of festive glam to your website but don't know where to start, we got you covered!

#websites #christmas #glowUp

negativepid.blog/create-a-fes...
Create a festive website in ten minutes - PID Perspectives
The holiday season is the perfect excuse to give your website a warm, cheerful makeover. Whether you want to surprise visitors with a festive greeting, promote
negativepid.blog
December 17, 2025 at 9:05 AM
As an IT professional, if you handle medical data in the United States, you need to be HIPAA compliant. This article summarizes practical compliance, the most common missteps, and the challenges of HIPAA.

#HIPAA #compliance #dataPrivacy #medicalRecords

negativepid.blog/hipaa-for-it...
HIPAA for IT and Security professionals - PID Perspectives
If you work in IT, cybersecurity, or digital compliance for a healthcare organization, you’ve likely heard “HIPAA compliance” more times than you can count.
negativepid.blog
December 17, 2025 at 7:00 AM
You use SSH for remote authentication. But do you know how it works in the background? For SSH authentication to work, you need a server at the backend. Here is how to execute a complete SSH server installation.

#ssh #authentication #servers #sshServer #howtoSsh

negativepid.blog/how-to-insta...
How to install and enable an SSH Server – PID Perspectives
In one of our previous articles, we introduced you to SSH authentication and its basic usage. However, you can’t use SSH as an authentication method unless the machine you want to log into isn’t preconfigured with an SSH server. This article covers the steps to set up a machine with SSH authentication. 
negativepid.blog
December 17, 2025 at 4:40 AM
Zero Trust Architecture is the gold standard of cybersecurity practices. With the motto "trust no one," it is meant to protect the company's assets and minimize the risk of insider threats as much as outside threats.

#ZTA #zeroTrust #compliance

negativepid.blog/an-introduct...
An Introduction to ZTA – PID Perspectives
Once upon a time, the network perimeter was considered a solid defence against external threats. However, the evolution of attack vectors over the last twenty years has led to a security paradigm of no trust, regardless of location. This model is called Zero-Trust Architecture (ZTA).
negativepid.blog
December 17, 2025 at 2:20 AM
As a WordPress website administrator, having a WAF is due diligence. However, as an admin, it's more common to perform actions that trigger a firewall block. When that happens, there's a quick way to bypass your firewall through the WP-CLI.

#WordPressSecurity

negativepid.blog/how-to-regai...
How to regain access to your website with WP-CLI – PID Perspectives
Have you ever lost access to your WordPress website? Instead of wasting hours with your hosting provider trying to explain why you need their help and getting, most of the time, redirected to expensive professional services, here’s how you can do it in a few minutes and at zero cost. 
negativepid.blog
December 17, 2025 at 12:00 AM
SSH is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure.

#ssh #remoteAuthentication

negativepid.blog/an-introduct...
An introduction to SSH – PID Perspectives
How do you access a computer without physically having access to it? How can you execute commands from another computer? Secure Shell (SSH) is one of the first tools you should know for remote access control. It’s the bread and butter for security testing, digital forensics, and system administration professionals. Here’s what you should know to get started. 
negativepid.blog
December 16, 2025 at 11:00 PM
MOD, the Masters of Deception, challenged the status quo of the old guard of hackers and changed the narrative: from elite groups to open knowledge. Here's how this NY-based group changed the perception of hackers forever.

#MOD #MastersOfDeception #HackingWars

negativepid.blog/mod-masters-...
MOD, Masters of Deception – PID Perspectives
Masters of Deception (also known as MOD) was one of the most infamous and important hacking groups of the late 1980s and early 1990s. Based in New York, this group was the fruit of a diaspora within the Legion of Doom hacking group. Together, these groups initiated the period known as the “hacking wars.”
negativepid.blog
December 16, 2025 at 9:00 PM
GDPR is one of the strictest privacy policies for websites. Europe has enforced it to protect online users and set up hefty fines for transgressors. Here is a quick guide on its main principles and how to stay compliant.

#GDPR #privacy #dataProtection #Europe

negativepid.blog/what-is-gdpr/
What is GDPR? – PID Perspectives
If you’ve ever browsed a website from a European country, you have probably noticed the “cookie banner.” That’s one of the requirements for compliance with GDPR, the General Data Protection Regulation of the European Union. However, GDPR is much more than cookies. To date, it’s considered the strictest data regulation in the world. What you might not know is that it doesn’t only apply to Europe.
negativepid.blog
December 16, 2025 at 6:40 PM
If you want to know more about real-life hackers, look no further: we have gathered the best documentaries on cybersecurity, surveillance and privacy, cybercrime, the digital underworld, tech, and society. Happy binging!

#documentaries #hackers #cybersecurity

negativepid.blog/cybersecurit...
Cybersecurity: the best documentaries – PID Perspectives
If you like documentaries and real-life stories, cybersecurity and cybercrime have a lot to offer to the genre. Here, you will find a collection of themed documentaries that will not disappoint you. 
negativepid.blog
December 16, 2025 at 4:20 PM
There are lots of misconceptions about the Internet and the technology we use every day to access the online world. Here are ten of the funniest digital tales we've heard and why digital literacy is important.

#onlineMyths

negativepid.blog/debunking-te...
Debunking ten digital myths - PID Perspectives
Let’s explore a few playful digital myths. Many of these stories float around social media or get shared during office chats.
negativepid.blog
December 16, 2025 at 2:15 PM
Anonymous is perhaps the most famous hacker collective in the world. How did it start, how did it work, and where are they now? Here is how the power of an ideology created a global movement.

#anonymous #hackers #hacktivism #socialMedia

negativepid.blog/anonymous-fr...
Anonymous: from 4chan to hacktivism - PID Perspectives
It began not as a movement, but as a joke. Long before Anonymous became a symbol of digital rebellion, it was simply a username.
negativepid.blog
December 16, 2025 at 2:01 PM
If you really want to grasp how Windows works, you need to understand its architecture. From its different modes to its components, we have it all mapped out for you.

#windows #OS #windowsArchitecture #OSarchitecture

negativepid.blog/understandin...
Understanding the Windows OS – PID Perspectives
Every device needs an Operating System (OS) to function. Think of it as the soul of your device. And while most people don’t need to know what’s behind the surface, hackers surely do. So, let’s discover how a Windows OS works and what makes it unique.
negativepid.blog
December 16, 2025 at 11:40 AM
From a prank in a dorm room to the most used social media platform in the world. Like him or not, Zuckerberg has shaped the way we communicate online. His mantra, “Move fast and break things,” has influenced how Silicon Valley operates.

#markZuckerberg #Facebook

negativepid.blog/behind-faceb...
Behind Facebook: Mark Zuckerberg - PID Perspectives
Mark Zuckerberg is the quintessential figure who shaped modern social media platforms: with Facebook he wanted to connect the world. He ended up controlling
negativepid.blog
December 16, 2025 at 9:21 AM
Is there a killer behind a nickname? Criminals are finding new ways of operating online, with Internet platforms unwillingly enabling serial and violent crime. We gathered a few case studies.

#criminology #violentCrime

negativepid.blog/when-the-int...
When the Internet becomes the crime scene - PID Perspectives
The internet didn't invent homicide. However, it's playing an important role in how offenders identify, approach, and control victims. In a small but
negativepid.blog
December 16, 2025 at 9:01 AM