Writing about software development, technology, information security, and leadership, a few bits at a time.
This week, Bluesky launched its early access federation for self-hosters. It lets you set up a Personal Data Server to host your data. Setting up a...
In software development, understanding the nuances of threat modeling is no longer an optional skill but a fundamental necessity for crafting secure...
In computing and cybersecurity, the distinction between pseudo-random numbers and cryptographically secure pseudo-random numbers is critical yet often...
Software developers are presented with a plethora of cryptographic functions, each designed to serve distinct purposes. From ensuring the...
This is a write-up for the TryHackMe's Mr. Robot room. Reconnaissance Happy Path Going through an application as a user, in the way it was intended...
So, you've been learning different pentesting techniques and tools, and you are eager to apply them in the wild. As exciting as this sounds, thou...