BlogDB
Home
Register
About
Random Blog Button
Volution Notes
#tech
Recent Posts
7 months ago -
Misusing Linux policy based routing for firewalling
8 months ago -
Linux UEFI booting simplified
8 months ago -
Infineon TPM firmware update on the HP t620 thin client
8 months ago -
Musing about a secure computer for sensitive data
last year -
Context binding password-based authentication
last year -
Pre-hashing large password files used with PBKDFs
last year -
Lightweight container building blocks
last year -
Please don't write application launchers in `sh`!
last year -
We need deterministic installs, not just immutable OSs
last year -
Linux becoming a Windows / OSX clone
last year -
Learning before dabbling in applied cryptography
last year -
Misusing random oracles for practical purposes
last year -
Experimenting with multi-factor encryption
last year -
My biases when choosing open-source tools
2 years ago -
SSH authorization keys experiments
2 years ago -
Privatizing our digital identities
2 years ago -
Another take on the binary to text encoding
2 years ago -
Binary to text encoding -- state of the art and missed opportunities
2 years ago -
Debating deterministic passwords
2 years ago -
Containerized deployments, the Death Star of complexity
2 years ago -
Passwords in deployment or development scripts?
2 years ago -
Memorable password schemes and patterns?
2 years ago -
Password strength for offline storage?
2 years ago -
Securing my static site server with seccomp
2 years ago -
Static site hosting hurdles
2 years ago -
Useful Firefox addons
2 years ago -
The many flavors of hashing
3 years ago -
On modern laptop requirements
3 years ago -
The impact of hacktivism / protestware in open-source
3 years ago -
Single binary executable packages
3 years ago -
Good to know -- issue 2021.02
4 years ago -
Security through stupidity, Banca Transilvania style
4 years ago -
Good to know -- issue 2021.01
4 years ago -
In Go-land you pay even for what you don't use
4 years ago -
The curious case of shell commands, or how "this bug is required by POSIX"
4 years ago -
Benchmarking "textual" file compression methods
4 years ago -
Properly sorting FQDNs in Bash
4 years ago -
Cleaning and compacting Git repositories
5 years ago -
The before time -- microsoft.com
5 years ago -
The before time -- google.com
5 years ago -
Good to know -- issue 2019.02
5 years ago -
A visual comparison between HTTP/1.1 vs HTTP/2
5 years ago -
Exfiltrating Go current goroutine ID
5 years ago -
Good to know -- issue 2019.01
5 years ago -
Containers Will Not Fix Your Broken Culture (and Other Hard Truths)
6 years ago -
Choosing Linux RAID5 chunk size (part 3) -- Ext4 / CDNjs raw data
6 years ago -
Choosing Linux RAID5 chunk size (part 2) -- the internet's wisdom
6 years ago -
The State Of Software Security In 2019
6 years ago -
Choosing Linux RAID5 chunk size (part 1) -- block-device level benchmarks
6 years ago -
The chronicle of getting text sizing to just work in mobile browsers
6 years ago -
Hello world!
This is a positive review. I recommend this blog.
This is a negative review. I dislike this blog.
Please login or register to post a review.
Login
Suggest a blog to be added
Suggest Blog