Latest — May 26, 2022 Cooking with Flask... Cooking up some code with Flask to demonstrate Apache load-balancing.
Securing the insecure... Using SSH tunnels to mitigate the risk posed by a device that can only talk over insecure channels.
The tension of strings and outliers... A professional musicians take on pressure and finding the right fit.
Dockering with CAS - Part 1 I've been working with and learning about SingleSignOn (aka SSO) for the past several months, specifically within a highly customized CAS SSO environment. To supplement my on-the-job training I naturally wanted to setup my very own CAS SSO infrastructure in a virtual lab. This post is a distilled version of
Tourniquet I wrote 'tourniquet' as a simple exercise for securing a booted laptop from a snatch-n-grab scenario using over-the-counter hardware. When you plug a flash-drive into a computer, the USB drivers installed on your operating system go to work identifying that device and what it's supposed to do. On a Linux
Dead-drop as a Service Introduction Data breaches have been on the rise in the United States since 2005, from 157 million to a staggering 1.6 billion in 2017 (Clement, J). While not the highest ranking vector of attack, USB sticks have long been seen as threat for leaking information due to their high
Wining about IE8 Wining about IE8 on Linux... If you're anything like me, you've accumulated a lot of computer gadgets over the years, be it an old floppy drive deck for those 'just in case' moments, or the 256MB thumbdrive from that convention you forgot about. Maybe it's just me, but being a