-
Adversarial mindsets
What’s the absolute worst thing that could happen with your application? How could an adversary leverage that mistake to their advantage?
-
Going analog
Sometimes it pays to sever the digital cord and leverage an analog solution. The change in medium will often change your perspective.
-
Radical candor
Performance reviews can be both a celebratory reflection on the last period of time and a chance to set expectations for the period to come.
-
Cryptopals: Set 1 – challenge 8
The final Cryptopals challenge in set 1 involves detecting AES when used in ECB mode. It will become a handy utility later on …
-
Cryptopals: Set 1 – challenge 7
Next up with Cryptopals is a challenge to decrypt AES in ECB mode. This is relatively easy in PHP!
-
Cryptopals: Set 1 – challenge 6
A return to Cryptopals means we get to break the repeating-key cipher we were working with before. Breaking crypto is fun!
-
Limiting network egress
Blocking incoming traffic is only half of a firewall’s features. Today let’s look at limiting outgoing traffic!
-
Basic firewall usage
If you run a server in the cloud, you need to use a firewall to protect it. Let’s look at the most basic settings of Ubuntu’s ufw system.
-
Overcoming imposter syndrome
Though it’s easy for me to think so sometimes, I am NOT an imposter. Neither are you.
-
Imposter syndrome
When are they going to notice? That I don’t belong here? That I’m an imposter. Oh no … I think they already know!








