Skip to the content.

~


Multi-Factor Authentication

A brief look at SMS-2FA, TOTP and hardware security keys, with some recommendations

To design and configure a firewall on a server

To design and configure a firewall on a server using Cisco Packet Tracer. Also involves testing correct configuration/ruleset.

Neovim Configuration

Switching from vim to neovim, and re-writing the configuration in pure-lua. Aim is to get an almost-IDE(syntax highlighting, autocompletion, code actions and LSP) working with only the most popular(well-supported), and lua-only plugins

Bypassing CGNAT with ngrok

ngrok is a cross-platform application that enables developers to expose a local development server to the Internet with minimal effort

Using ngrok for administration and remote desktop for systems on a home network behind CGNAT

Creating a network topology map using Cisco Packet Tracer

Setting up a small network of a few network and end devices using Hubs/Switches. It includes configuring LAN Cards, interfaces, preparation of cables, assigning IP addresses, and checking the connection of the network, all done in Cisco packet tracer, a network topology mapper.

SQL Injection

SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application’s content or behavior.