Skip to content
Addie LaMarr Addie LaMarr

Embrace technology to live your dream life

  • About Addie
  • Mentorship
  • Blog
    • Cybersecurity
      • Hacking
      • Privacy
    • Financial Activism
      • Economics
      • Cryptocurrency
    • Lifestyle
      • Career
      • Personal Brand
      • Digital Well-Being
      • Second Brain
      • Social Commentary
      • Solarpunk IRL
  • Wiki
    • Cybersecurity
  • About Addie
  • Mentorship
  • Blog
    • Cybersecurity
      • Hacking
      • Privacy
    • Financial Activism
      • Economics
      • Cryptocurrency
    • Lifestyle
      • Career
      • Personal Brand
      • Digital Well-Being
      • Second Brain
      • Social Commentary
      • Solarpunk IRL
  • Wiki
    • Cybersecurity
  • Twitter
  • Linkedin
  • Instagram
Subscribe
  • Home
  • Addie LaMarr
  • Page 3
About Addie LaMarr
Addie is a neurodivergent cyborg on a mission to meld minds with machines, navigating the digital universe with aphantasia, ADHD, and autism as her guides. With 14 years in cybersecurity, 9 years in the cryptoverse, and a lifetime love for computers, she's your quintessential tech evangelist. From her first website built to save sea turtles to mastering the dark arts of cryptography and OSINT, Addie is here to empower and educate on cybersecurity, privacy, and blockchain technology.
The AuDHD Morning Routine for Euphoric Flow States
Posted inDigital Well-Being

The AuDHD Morning Routine for Euphoric Flow States

A few years ago I stopped taking the copious amounts of Adderall I needed to function. It was so rough and I…
Read More
Quick Start Obsidian Guide
Posted inDigital Well-Being Second Brain

Quick Start Obsidian Guide

Feeling like your brain is about to explode from all the information you're juggling? Welcome to the club. But don’t worry, there's…
Read More
How to Hack Algorithms into Thinking You’re Pregnant
Posted inCybersecurity Mastery Hacking

How to Hack Algorithms into Thinking You’re Pregnant

Why Are You Seeing Ads for Things You Never Searched For? Ever searched for something online, only to be bombarded with ads…
Read More
Elevate Your Tech Career Through Effective Documentation
Posted inCareer Cybersecurity Mastery

Elevate Your Tech Career Through Effective Documentation

Let’s face it, most people don't give a damn about documentation. It’s often seen as the boring, thankless part of tech work.…
Read More
The Cybersecurity Job Market is FUBAR: How to Hack the Hiring Process
Posted inCareer Cybersecurity Mastery

The Cybersecurity Job Market is FUBAR: How to Hack the Hiring Process

You're a novice in a twisted, rigged video game—the cybersecurity job market. Your goal? Land a job. The reality? AI filters, phony…
Read More
CyberShrekurity: How to Keep Lord Farquaad Outta Your Swamp
Posted inCybersecurity Mastery Cyborg Bytes

CyberShrekurity: How to Keep Lord Farquaad Outta Your Swamp

Home Network Security Checklist Addie LaMarr.pdf701.19 KB • PDF FileDownload Hey there, cyborgs! Let's face it—cybersecurity often feels like its guarded by…
Read More
Why Nietzsche Would Roast The Ever-loving F*ck Out of Gatekeepy Tech Bros
Posted inSocial Commentary

Why Nietzsche Would Roast The Ever-loving F*ck Out of Gatekeepy Tech Bros

If Friedrich Nietzsche were alive today, he'd have a field day with the gatekeepy tech bro crowd. You know, those folks who…
Read More
Your Password Manager is Probably F*cked
Posted inCybersecurity Mastery

Your Password Manager is Probably F*cked

Make sure to download this file below! This is the quick-reference freebie guide. Password ManagersDownload Alright, folks, let's cut to the chase—your…
Read More
Tough love for aspiring hackers
Posted inCareer Hacking

Tough love for aspiring hackers

So, you want a job as an ethical hacker, huh? Dreaming of breaching firewalls and exposing vulnerabilities like a tech ninja? I…
Read More
Hacking Information Gathering and Device Analysis Tutorial
Posted inCybersecurity Mastery Hacking

Hacking Information Gathering and Device Analysis Tutorial

This tutorial provides a guide on how to use various network scanning tools to discover and analyze devices connected to a network.…
Read More

Posts pagination

Previous page 1 2 3 4 5 … 11 Next page
Trending
  • Life After Rock Bottom: From Autistic Burnout to a Life I Love
    by Addie LaMarr
    April 12, 2025
  • Life After Rock Bottom: From Autistic Burnout to a Life I LoveApril 12, 2025
  • How a Simple Apple Notes Hack Revolutionized My AuDHD LifeApril 12, 2025
  • How to Lock Down Your Genetic Data (Before It Gets Sold Off)April 8, 2025

Categories

  • Career
  • Cryptocurrency
  • Cybersecurity Mastery
  • Cyborg Bytes
  • Digital Well-Being
  • Disability
  • Economics
  • Financial Activism
  • Hacking
  • Journal
  • Personal Brand
  • Privacy
  • Quotes
  • Second Brain
  • Social Commentary
  • Solarpunk IRL
  • Uncategorized
Tags

Aphantasia ChatGPT Cyborg Bytes Deep Dive Shitpost

Let's Connect
  • Twitter
  • Instagram
  • TikTok
  • LinkedIn
Editors Picks
    Categories
    • Career 6
    • Cryptocurrency 15
    • Cybersecurity Mastery 32
    • Cyborg Bytes 47
    • Digital Well-Being 27
    • Disability 2
    • Economics 2
    • Financial Activism 1
    • Hacking 17
    • Journal 5
    • Personal Brand 2
    • Privacy 6
    • Quotes 1
    • Second Brain 3
    • Social Commentary 1
    • Solarpunk IRL 2
    • Uncategorized 15
    Copyright 2025 — Addie LaMarr. All rights reserved.
    Scroll to Top