BlogDB
Home
Register
About
Random Blog Button
Volution Notes
#tech
Recent Posts
3 months ago -
Misusing Linux policy based routing for firewalling
3 months ago -
Linux UEFI booting simplified
4 months ago -
Infineon TPM firmware update on the HP t620 thin client
4 months ago -
Musing about a secure computer for sensitive data
7 months ago -
Context binding password-based authentication
8 months ago -
Pre-hashing large password files used with PBKDFs
last year -
Lightweight container building blocks
last year -
Please don't write application launchers in `sh`!
last year -
We need deterministic installs, not just immutable OSs
last year -
Linux becoming a Windows / OSX clone
last year -
Learning before dabbling in applied cryptography
last year -
Misusing random oracles for practical purposes
last year -
Experimenting with multi-factor encryption
last year -
My biases when choosing open-source tools
last year -
SSH authorization keys experiments
last year -
Privatizing our digital identities
last year -
Another take on the binary to text encoding
last year -
Binary to text encoding -- state of the art and missed opportunities
last year -
Debating deterministic passwords
last year -
Containerized deployments, the Death Star of complexity
last year -
Passwords in deployment or development scripts?
last year -
Memorable password schemes and patterns?
last year -
Password strength for offline storage?
2 years ago -
Securing my static site server with seccomp
2 years ago -
Static site hosting hurdles
2 years ago -
Useful Firefox addons
2 years ago -
The many flavors of hashing
2 years ago -
On modern laptop requirements
2 years ago -
The impact of hacktivism / protestware in open-source
2 years ago -
Single binary executable packages
3 years ago -
Good to know -- issue 2021.02
3 years ago -
Security through stupidity, Banca Transilvania style
3 years ago -
Good to know -- issue 2021.01
3 years ago -
In Go-land you pay even for what you don't use
3 years ago -
The curious case of shell commands, or how "this bug is required by POSIX"
4 years ago -
Benchmarking "textual" file compression methods
4 years ago -
Properly sorting FQDNs in Bash
4 years ago -
Cleaning and compacting Git repositories
4 years ago -
The before time -- microsoft.com
4 years ago -
The before time -- google.com
5 years ago -
Good to know -- issue 2019.02
5 years ago -
A visual comparison between HTTP/1.1 vs HTTP/2
5 years ago -
Exfiltrating Go current goroutine ID
5 years ago -
Good to know -- issue 2019.01
5 years ago -
Containers Will Not Fix Your Broken Culture (and Other Hard Truths)
5 years ago -
Choosing Linux RAID5 chunk size (part 3) -- Ext4 / CDNjs raw data
5 years ago -
Choosing Linux RAID5 chunk size (part 2) -- the internet's wisdom
5 years ago -
The State Of Software Security In 2019
5 years ago -
Choosing Linux RAID5 chunk size (part 1) -- block-device level benchmarks
5 years ago -
The chronicle of getting text sizing to just work in mobile browsers
6 years ago -
Hello world!
This is a positive review. I recommend this blog.
This is a negative review. I dislike this blog.
Please login or register to post a review.
Login
Suggest a blog to be added
Suggest Blog