Troubleshooting unencrypted, encrypted, and proxied network connections
I've spent the past few weeks crafting this post because I want it to serve several purposes: 1. Giving God the glory. He's known me since before I was born and has been with me through every stumbling step. 2. Encourage anyone struggling towards a career in cyber security. TLDR,
I was recently privileged with an opportunity to troubleshoot a system outside my computer lab; my car. What follows is a little walk through on how I fixed the issue as well as some philosophical musing that occurred to me while working it. Full disclosure, I'm no shade-tree mechanic. I
Cooking up some code with Flask to demonstrate Apache load-balancing.
Using SSH tunnels to mitigate the risk posed by a device that can only talk over insecure channels.
A professional musicians take on pressure and finding the right fit.
iSpy Agent DVR docker setup running as a service
Part 2 of building and configuring CAS docker containers
I've been working with and learning about SingleSignOn (aka SSO) for the past several months, specifically within a highly customized CAS SSO environment. To supplement my on-the-job training I naturally wanted to setup my very own CAS SSO infrastructure in a virtual lab. This post is a distilled version of
I wrote 'tourniquet' as a simple exercise for securing a booted laptop from a snatch-n-grab scenario using over-the-counter hardware. When you plug a flash-drive into a computer, the USB drivers installed on your operating system go to work identifying that device and what it's supposed to do. On a Linux