diff --git a/_config.yml b/_config.yml index 549eeb40..9d432a42 100644 --- a/_config.yml +++ b/_config.yml @@ -13,7 +13,7 @@ footer_text: > Hosted by GitHub Pages. keywords: jekyll, jekyll-theme, academic-website, portfolio-website # add your own keywords or leave empty lang: en # the language of your site (for example: en, fr, cn, ru, etc.) -icon: ⚛️ # the emoji used as the favicon (alternatively, provide image name in /assets/img/) +icon: djbsec.png # the emoji used as the favicon (alternatively, provide image name in /assets/img/) url: https://djbsec.github.io # the base hostname & protocol for your site baseurl: # the subpath of your site, e.g. /blog/. Leave blank for root diff --git a/preview-explained.html b/preview-explained.html deleted file mode 100644 index 3836f71f..00000000 --- a/preview-explained.html +++ /dev/null @@ -1,559 +0,0 @@ - - - - - - Cybersecurity Explained — Design Preview - - - - - - - - -
-
Design Preview — Option 1: Directory Layout
- - - - - -
- - - - -
- -

9 topics

- - -
- -
-
-
Phishing
-
How attackers use fake emails and messages to steal credentials, money, and personal data
-
-
- Threat - -
-
- - -
-
-
Email Spoofing
-
When attackers forge sender addresses to impersonate trusted organizations or contacts
-
-
- Threat - -
-
- - -
-
-
Ransomware
-
Malicious software that encrypts your files and demands payment to restore access
-
-
- Threat - -
-
- - -
-
-
Social Engineering
-
Psychological manipulation tactics used to trick people into revealing sensitive information
-
-
- Threat - -
-
- - -
-
-
Firewalls
-
Network gatekeepers that filter traffic based on security rules to block unauthorized access
-
-
- Defense - -
-
- - -
-
-
Strong Passwords
-
Why password length and uniqueness matter, and how to manage them without losing your mind
-
-
- Defense - -
-
- - -
-
-
Two-Factor Authentication
-
A second verification step that stops attackers even when your password is compromised
-
-
- Defense - -
-
- - -
-
-
Zero Trust
-
The security model that verifies every user and device continuously — never assume, always verify
-
-
- Defense - -
-
- - -
-
-
VPN
-
How Virtual Private Networks encrypt your connection and protect your privacy online
-
-
- Tools - -
-
-
- -
- - - - - diff --git a/purgecss.config.js b/purgecss.config.js index 56d3b2e2..a8a32024 100644 --- a/purgecss.config.js +++ b/purgecss.config.js @@ -18,5 +18,7 @@ module.exports = { /^float-/, /^rounded/, /^z-depth-/, + // Cybersecurity Explained directory — classes applied via Liquid/JS at runtime + /^explained-/, ], };