This won't be a long blog post, just a little pointer to an A/D CTF challenge
that I created last year: A damn vulnerable web framework written in bash.
Have you ever been unsure about applying a certain network route, because you
feared mis-routing or losing your own connection?
Now there is a solution to this problem: routes-apply.sh
About two years ago I came across a .DS_Store file and wanted to extract its information (e.g. file names). After researching the file format and its security implications,
In this blogpost I'll share a small guide on how to automatically lock your
screen when you remove your Yubikey.
I have my Yubikey on my key ring, so whenever
I've recently started to look into basic application security concepts using the
imho excellent material from OpenSecurityTraining.info
[http://opensecuritytraining.info/Exploits1.html]. In this blogpost I'd like to