Multi-Factor Authentication
A brief look at SMS-2FA, TOTP and hardware security keys, with some recommendations
To design and configure a firewall on a server
To design and configure a firewall on a server using Cisco Packet Tracer. Also involves testing correct configuration/ruleset.
Neovim Configuration
Switching from vim to neovim, and re-writing the configuration in pure-lua. Aim is to get an almost-IDE(syntax highlighting, autocompletion, code actions and LSP) working with only the most popular(well-supported), and lua-only plugins
Bypassing CGNAT with ngrok
ngrok is a cross-platform application that enables developers to expose a local development server to the Internet with minimal effort
Using ngrok for administration and remote desktop for systems on a home network behind CGNAT
Creating a network topology map using Cisco Packet Tracer
Setting up a small network of a few network and end devices using Hubs/Switches. It includes configuring LAN Cards, interfaces, preparation of cables, assigning IP addresses, and checking the connection of the network, all done in Cisco packet tracer, a network topology mapper.
SQL Injection
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application’s content or behavior.