September 25, 2020 Simple PyType Examples Introduction PyType (https://github.com/google/pytype) enables you to add typing to your Python code. This can be a huge help for larger projects especially. One of…
September 25, 2020 Security Keys are Better You need to start using security keys for your multi-factor (2FA) implementation. Sure, I would be willing to concede that if you really cannot…
September 20, 2020 A Hacker’s Code of Honor I have been spending a fair amount of time lately thinking about the state of the information security industry. I don’t think that things…
July 1, 2020 Kata for hackers What is a “Kata” The Japanese word for “form”; a kata is a set of moves, intended to be executed in a linear fashion….
May 31, 2020 10 Reasons to Ditch Zoom 1: Zoom lies about their encryption There is a really cool technology that you can use to protect your communications called ‘end-to-end’ encryption. It…
May 29, 2020 Making a Hacker Attack Themselves Okay, this is a fun one. Today we’re going to discuss a tool that you can use as a network defender to cause a…
May 27, 2020 I Predict a Cyberattack The world is changing. If anything, the global coronavirus pandemic is accelerating the arrival of the future. Offices lay empty, replaced by cyberpunk-esque video…
May 13, 2020 Python Dependency Injection Made Simple In as few words as possible, I am going to explain to you how and why to use dependency injection in Python. What does…
May 25, 2019 Dynamic Reverse Tunnels in SSH Did you know this was a thing you could do with SSH? I certainly didn’t until very recently. That’s because it wasn’t a thing…
May 13, 2019 SameSite cookies in practice You may or may not have heard about this new cookie attribute being slowly phased in across the web. The idea behind the SameSite…