About:

A place for my (mostly security related) thoughts

Website:

Specializations:

Incoming Links:

Subscribe to RSS:
The text provides a guide on how to redirect an entire domain to another in Traefik, detailing the configuration and setup required for HTTP and HTTPS routers.
This post provides a quick reference for the major changes introduced with each new version of Python, including syntax and standard library changes, end-of-life dates, and useful tools, links, and utilities for upgrading code bas...
The text discusses the flaws in technical interview practices and provides guidance on how to design efficient, accurate, and repeatable technical interviews. It emphasizes the importance of recruitment and selection, evaluation c...
The text discusses the importance of authentication in securing applications and enabling personalized websites. It covers different forms of authentication used in software, including authenticating actors, authentication factors...
The text discusses the use of Reachability Analyzer from AWS to debug a Lambda function that was timing out when connecting to a server. The author shares their experience and the steps they took to identify and solve the problem....
The text discusses the concept of 'auth' and its two distinct processes: authentication and authorisation. It explains the broad definition of authentication and the various processes involved in authenticating personal and compan...
The post discusses the updates made to domain-park.org to bring it into Beta. It covers the updates to the production server, the use of a DNS server as a load-balancer, and the improvements to the underlying software.
Dash 2020 was DataDog's annual conference held virtually in 2020. The text discusses two favorite talks from the conference, one about measuring software quality at Instacart and the other about avoiding full system rewrites in so...
The post discusses the factors that affect the security of an organization, including physical presence, web presence, type of organization, internal processes, regulatory requirements, certification requirements, security maturit...
The text discusses the importance of web browsing safety and introduces two browser plugins that can enhance privacy and security. It explains the concept of plugins, provides a word of warning about their potential security threa...
The text discusses the issue of email spoofing on unused domains and the importance of securing parked email domains. It provides detailed information on how to secure parked domains using SPF, DKIM, DMARC, and MX records. The aut...
The text provides tips for protecting online accounts, focusing on the importance of security and the risks of hacking. It discusses the vulnerability of different types of accounts and the importance of two-factor authentication ...

0Defining Security

2019-11-11

The post explores the concept of security and how it applies to organizations. It discusses the dictionary definition of security and the challenges in defining it. The post also delves into threat modeling and how organizations c...
The author discusses the best way to learn about building websites, which is to actually build one. They provide a plan for building a simple blog and recommend using Python, Flask, Jinja2, and SQLAlchemy. They also give advice on...
The author discusses their decision to focus on writing content rather than writing software, and their choice to use the Ghost blogging platform. They outline the considerations for building their own blog versus using existing s...