Marcel Rick-CenSecurity Analysis of an IX2400 VPN Gateway: Firmware ExtractionIn this article we delve into the process of extracting and analyzing the firmware of an IX2400 device using flashrom, binwalk and…3 min read·3 hours ago--
Mike HearningraalvmWriting Truly Memory Safe JIT CompilersHow to kill off a top source of browser exploits10 min read·Jun 6, 2024--3
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.·7 min read·May 12, 2024--37--37
🇮🇳 Ayush SinghinA.R.P. SyndicateTop 10 Browser Extensions for Cybersecurity PractitionersBrowser extensions can enhance your capabilities by automating tasks, and providing essential functionalities directly in your browser.1 min read·6 hours ago----
Radu ZahariaOn phones, security, and the modern DNSI always wanted to have my own DNS server. Not for every possible Internet query, but just for the ones I want. I like to avoid using IPs…10 min read·May 27, 2024--4--4
Marcel Rick-CenSecurity Analysis of an IX2400 VPN Gateway: Firmware ExtractionIn this article we delve into the process of extracting and analyzing the firmware of an IX2400 device using flashrom, binwalk and…3 min read·3 hours ago--
Mike HearningraalvmWriting Truly Memory Safe JIT CompilersHow to kill off a top source of browser exploits10 min read·Jun 6, 2024--3
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.·7 min read·May 12, 2024--37
🇮🇳 Ayush SinghinA.R.P. SyndicateTop 10 Browser Extensions for Cybersecurity PractitionersBrowser extensions can enhance your capabilities by automating tasks, and providing essential functionalities directly in your browser.1 min read·6 hours ago--
Radu ZahariaOn phones, security, and the modern DNSI always wanted to have my own DNS server. Not for every possible Internet query, but just for the ones I want. I like to avoid using IPs…10 min read·May 27, 2024--4
LORYInterviewer: Why self-sign is not safe?SSL certificate verification process explained in 3 minutes·4 min read·Jun 5, 2024--6
Shlomi Boutnaru, Ph.D.The Linux Security Journey — ACL (Access Control Lists)In general, ACL (Access Control Lists) provides the ability to set permissions to a file/directory in a more granular way then the normal…2 min read·4 hours ago--
Ike Gabriel YusoninTowards AWSHow serverless security shifts to the leftImagine not managing and provisioning servers. Imagine only focusing on deploying code and not worrying about infrastructure.7 min read·Apr 30, 2024--1