Cyber Security
iOS VPN Vulnerabilities and Data Leaks: An Ongoing Issue
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
The journey of new NIST password guidelines in 2024 reflects a fundamental shift in cybersecurity thinking, moving from complexity-focused approaches to more user-centric, practical security measures.
Tech
iOS on iPhones has difficulty connecting to SMB shares and servers. The workaround for devices below iOS 18.1 would be to lower the protocol supported on the server.
Programming
This Go project creates a Kubernetes Security Monitor that periodically checks for common security issues in a cluster. It includes checks for privileged containers, missing network policies, and outdated Kubernetes versions.
Tech
A hosts file is a local file that contains domain names and their matching IPs. It’s found in all common systems. The hosts file itself dates back to around 1982 when it was used in the Berkeley Software Distribution (BSD), an early version of the Unix operating system. Initially,
Cyber Security
Be your own Certificate Authority (CA) and issue your own signed certificates to use for encrypted communications
Cyber Security
Trying to enhance local network access, I imported the Cloudflare Origin Server certificate. Despite adding it to Windows' Trusted Root Certification Authorities, Chrome flagged a certificate error, labeling the connection insecure. Firefox, however, indicated a secure connection without warnings.
Programming
Simple Golang app that executes a script from a webhook