I regularly transfer websites from my computer to my mobile devices. In order to do this, I don’t use any fancy apps or email, but…
A blog about IT, security and whatever crosses my mind.
A passionate security researcher and software engineer. In his professional work, he is especially interested in the interaction between users and technology. On his blog he shares personal experiences and challenges that he encounters in his personal and professional life.
I regularly transfer websites from my computer to my mobile devices. In order to do this, I don’t use any fancy apps or email, but…
Given the recent debates about secure and encrypted communication, it might be interesting to understand why most mobile messenger apps do not exactly allow anonymous communication and what possibilities exist to enable it.
I do not read books very often and when I do, I tend to do it in a day or two. In 2016 I read…
Hey there! I have not posted for quite a bit of time. It seems I get a good amount of readers because of the one…
This week I learned about Unix file permissions and realized that I did not know anything about it. But apparently, it is not that difficult…
Last week I had to write an [tooltip tip=”Network Time Protocol”]NTP[/tooltip] spoofer for a hacking course. The main goal was to manipulate [tooltip tip=”Network Time…
Update 5 Spiegel Online scheint seit Juni 2018 kein LaterPay mehr zu verwenden. Sie haben es mit einer richtigen Paywall ersetzt, was ein Abo voraussetzt.…
In the last few weeks, I had to analyze Linux images as part of a computer forensics course. For the course, a participant got a…
Lately I have read about a shocking vulnerability, which resides in every browser due to a design flaw. The vulnerability exposes you to an attack…
Hello! This is a test page that demonstrates a tabnabbing attack on your browser. What happened? If the website which opened this page was configured…