pietvanzoen + security   24

Whitelisting outgoing traffic from docker containers - Server Fault
I have a server running multiple docker containers in the following configuration:
One of the containers is a reverse proxy binding to the exposed ports of the other containers. This is the only
security 
18 days ago by pietvanzoen
npm Best Practices | @RisingStack
Learn the best practices of using npm: Installation, finding & investigating packages, saving or locking dependencies, securing projects and more!
npm  security 
12 weeks ago by pietvanzoen
A Guide To OAuth 2.0 Grants - Alex Bilbie
The OAuth 2.0 specification is a flexibile authorization framework that describes a number of grants (“methods”) for a client application to acquire an access token (which represents a user’s perm...
security 
july 2018 by pietvanzoen
My $169 development Chromebook
How Chrome OS, Termux, YubiKey and Duo Mobile make for great usable security. A travel Chromebook for modern development, online and offline.
security  development  share 
january 2018 by pietvanzoen
Should you encrypt or compress first?
Gary looks you in the eyes and says: "You're designing a network protocol. Do you compress the data and then encrypt it, or do you encrypt and then compress?" And then he clasps his hands together and smiles to himself.

A classic security interview question!
security 
march 2017 by pietvanzoen
Google Online Security Blog: Announcing the first SHA1 collision
Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision.
security 
february 2017 by pietvanzoen
Two Factor Auth List
List of sites with Two Factor Auth support which includes SMS, email, phone calls, hardware, and software.
security 
december 2016 by pietvanzoen
Best VPN Service | NordVPN
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 700+ servers in 50+ countries.
security  vpn 
november 2016 by pietvanzoen
Privoxy - Home Page
Privoxy helps users to protect their privacy.
security  tools 
november 2016 by pietvanzoen
StevenBlack/hosts: Extending and consolidating hosts files from a variety of sources like adaway.org, mvps.org, malwaredomains.com, someonewhocares.org, yoyo.org, and potentially others. You can optionally invoke extensions to block additional sites by ca
Extending and consolidating hosts files from a variety of sources like adaway.org, mvps.org, malwaredomains.com, someonewhocares.org, yoyo.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
security  browser 
november 2016 by pietvanzoen
I know none of my passwords.
I tweeted the other day that I no longer know any of my passwords. People seemed to think it was a joke, so I decided I’ll go into a little more depth on exactly how I’m doing it. Okay I think I’ve finally configured by internets for maximum... | Colby Aley | programming + startups / building reflect.io
security 
november 2016 by pietvanzoen
Coding, Learning and IT Security – Typosquatting programming language package managers
Edit: It seems that the blog post and the thesis caused quite some interest. Please contact me under the following mail address, since my mail server on this VPS is constantly down :/ tschachn [|[at]|] hu-berlin [[|dot|]] de The complete thesis can be downloaded as a PDF. via Pocket
security 
june 2016 by pietvanzoen
@Deray’s Twitter Hack Reminds Us Even Two-Factor Isn’t Enough | WIRED
Skip Article Header. Skip to: Start of Article. This has been the week of Twitter hacks, from Mark Zuckerberg to a trove of millions of passwords dumped online to, most recently, Black Lives Matter activist DeRay McKesson. via Pocket
security 
june 2016 by pietvanzoen
The latest DNS bug is terrifying, widespread, and reveals deep flaws in Internet security / Boing Boing
Dan Kaminsky is master of all that is terrible and wonderful about the Internet's Domain Name Service, a vital piece of Internet infrastructure dating back to 1983, whose criticality and age make it a source of ongoing problems in Internet securityland. via Pocket
bugs  security 
february 2016 by pietvanzoen

Copy this bookmark:



description:


tags: