A few years ago, I made a blog post about a technique called “tab nabbing”, which can be used to trick the user into entering…
A blog about IT, security and whatever crosses my mind.
A few years ago, I made a blog post about a technique called “tab nabbing”, which can be used to trick the user into entering…
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
If you extensively use Docker on your machine, you might have noticed how unused instances take up a lot of space on your hard drive.…
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science” in my region, which is a local event that allows researchers, companies, and other to…
I hate bad grammar. I hate typos. Not only that, but I have a rare case of “something in this text is triggering my brain”,…
I have been working with Flutter on and off for over a year and learning new things about the programming language Dart. As always with…
A seven-day holiday in my Italian home town with family reminded me why people do not like family gatherings: it’s loud, everyone is stressed and…
After a few years in the security business, most people develop “security awareness”, a useful superpower that normal people would call “paranoia”. The Awareness is…
Most of my posts in this blog are based on Scratch your own itch projects: When you have a problem and you work on a…