What is a Software Supply Chain Attack?

There are essentially two types of software supply chain attack, Software Compromise to third party components of software, Watering Hole Attacks Watering Hole Attacks Software products have many facets and features that require real human capital and investment to implement. As a compromise in software development, software vendors may use code from third party libraries, plugins or even adapt existing software to reduce investment and enhance their product offering. In cases where software vendors do not produce all parts of their applications they rely on the trust and value the third party software they have incorporated in to their product… Continue reading What is a Software Supply Chain Attack?

Exporting GnuCash Data to PowerBi

Some things are better if you do them yourself. I mainly did this project to keep a running ledger of the changes that I would need to keep track of the account balance data. GnuCash is great, but when I export my accounts data the CSV file isn’t easily translated with power-query automatically. I decided that because I need to keep track of my transactions, this problem was best suited with a little program to calculate my net inflows and outflows using a python program, I also decided halfway through the project that I wanted to hook it up to… Continue reading Exporting GnuCash Data to PowerBi