I have been a cloud storage user for years. I started with Dropbox, which offered over 100GB of drive space for free, through a number of promotions and collaborations (e.g.…
A blog about IT, security and whatever crosses my mind
I have been a cloud storage user for years. I started with Dropbox, which offered over 100GB of drive space for free, through a number of promotions and collaborations (e.g.…
One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers. I thought about WebRTC, the…
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges from a regular user account…
One of the most popular hacking requests, besides “how to hack facebook”, is how to gain access to protected WiFi networks. Many years ago, this was an easy task, as…
In the field of criminal investigations, it is often necessary to search for evidence on electronic devices. Digital traces can be found on computers, tablets, phones, USB drives, but also…
If you happen to own a Linux system, I am sure you already searched for solutions to problems on the Internet, only to find smart people that wrote down the…
Das ist ein Beitrag für Menschen, die in ihrer Freizeit nicht mit ihrem Internet-Browser spielen, sondern etwas Sinnvolles mit ihrer Zeit anstellen. Da ich zu Ersteren gehöre, kann ich mit…
In the last months I have been working intensively with honeypots. Honeypots are real or simulated systems used to analyze and detect attacks in a network. By posing as a…
Ever heard of AWS, GCP or Azure? These are abbreviations for services that build the backbone of many websites and services on the Internet, and as a developer you should…
Hello everyone, one of my favorite Open Source projects just got a significant update! With version 2.3.0 of KeepassXC, the team finally created an official browser plugin for Google Chrome,…