September 25, 2020 Physical Stealth Ever since I was a small child, I have had a love for being “sneaky.” This love for sneaking is what eventually helped bring…
September 25, 2020 Simple PyType Examples Introduction PyType (https://github.com/google/pytype) enables you to add typing to your Python code. This can be a huge help for larger projects especially. One of…
September 25, 2020 Security Keys are Better You need to start using security keys for your multi-factor (2FA) implementation. Sure, I would be willing to concede that if you really cannot…
September 20, 2020 A Hacker’s Code of Honor I have been spending a fair amount of time lately thinking about the state of the information security industry. I don’t think that things…
July 1, 2020 Kata for hackers What is a “Kata” The Japanese word for “form”; a kata is a set of moves, intended to be executed in a linear fashion….
May 31, 2020 10 Reasons to Ditch Zoom 1: Zoom lies about their encryption There is a really cool technology that you can use to protect your communications called ‘end-to-end’ encryption. It…
May 29, 2020 Making a Hacker Attack Themselves Okay, this is a fun one. Today we’re going to discuss a tool that you can use as a network defender to cause a…
May 27, 2020 I Predict a Cyberattack The world is changing. If anything, the global coronavirus pandemic is accelerating the arrival of the future. Offices lay empty, replaced by cyberpunk-esque video…
May 13, 2020 Python Dependency Injection Made Simple In as few words as possible, I am going to explain to you how and why to use dependency injection in Python. What does…
May 25, 2019 Dynamic Reverse Tunnels in SSH Did you know this was a thing you could do with SSH? I certainly didn’t until very recently. That’s because it wasn’t a thing…