Cooking up some code with Flask to demonstrate Apache load-balancing.
Using SSH tunnels to mitigate the risk posed by a device that can only talk over insecure channels.
A professional musicians take on pressure and finding the right fit.
iSpy Agent DVR docker setup running as a service
Part 2 of building and configuring CAS docker containers
I've been working with and learning about SingleSignOn (aka SSO) for the past several months, specifically within a highly customized CAS SSO environment. To supplement my on-the-job training I naturally wanted to setup my very own CAS SSO infrastructure in a virtual lab. This post is a distilled version of
I wrote 'tourniquet' as a simple exercise for securing a booted laptop from a snatch-n-grab scenario using over-the-counter hardware. When you plug a flash-drive into a computer, the USB drivers installed on your operating system go to work identifying that device and what it's supposed to do. On a Linux
Introduction Data breaches have been on the rise in the United States since 2005, from 157 million to a staggering 1.6 billion in 2017 (Clement, J). While not the highest ranking vector of attack, USB sticks have long been seen as threat for leaking information due to their high
Wining about IE8 on Linux... If you're anything like me, you've accumulated a lot of computer gadgets over the years, be it an old floppy drive deck for those 'just in case' moments, or the 256MB thumbdrive from that convention you forgot about. Maybe it's just me, but being a
Society needs privacy. Here's why.