unattended-upgrades, making security a priority
One of the little white lies that we tell ourselves is that ‘security is a priority’. It’s not. If it were, we would spend more time on it. Because what…
The World Will Turn If You're Ready or Not
One of the little white lies that we tell ourselves is that ‘security is a priority’. It’s not. If it were, we would spend more time on it. Because what…
In today’s digital age, website security is paramount. One often overlooked yet highly effective method to bolster your site’s defenses is by implementing a .well-known/security.txt file. This file serves as…
Tunneling traffic encrypted through a VPN tunnel is not always necessary. If endpoint anonymity is not an issue, or if its just a matter of carrier/LAN distrust. A Socks Proxy…
Proxy Madness Using Squid or any other proxy for transparent caching/filtering of HTTP traffic has many benefits, being for logging purposes or the aforementioned use-cases, keeping every client configured can…
Years ago, Moxie Marlinspike taught us that web-browser hints such as a “lock icon” in the address bar, didn’t guarantee ciphered communication. Since the website you are visiting still happily…