IT security is a complex field, which makes protecting goods and data against attacks a really difficult and ongoing challenge. As a security professional, I…
A blog about IT, security and whatever crosses my mind.
IT security is a complex field, which makes protecting goods and data against attacks a really difficult and ongoing challenge. As a security professional, I…
This is a totally short post, but vital information for me. I always end up searching for this online and always forget how to do…
Last week I saw this tweet, which sparked a lot of interesting discussion about security of compilers.
For every programming problem that I have had in the past, there may have been a solution that I found and implemented. In most cases,…
I have been a cloud storage user for years. I started with Dropbox, which offered over 100GB of drive space for free, through a number…
One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers.…
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges…
One of the most popular hacking requests, besides “how to hack facebook”, is how to gain access to protected WiFi networks. Many years ago, this…
In the field of criminal investigations, it is often necessary to search for evidence on electronic devices. Digital traces can be found on computers, tablets,…
If you happen to own a Linux system, I am sure you already searched for solutions to problems on the Internet, only to find smart…