DevOps & System Admin. How TOTP Systems Like Google Authenticator Work A history of the HOTP one-time password method, how the current TOTP system works, and a few risks inherent to the TOTP approach.
Personal Optimization Staying (Digitally) Safe During COVID-19 – Four Steps to Personal Cyber Security Cyber threats and scams have escalated during the COVID-19 pandemic. Here are are some tips and advice on what you can do to stay secure.
Development Practices Security Hygiene for Software Professionals Taking responsibility for your security hygiene is essential and not very difficult. Here are 7 things you should start doing as soon as possible.
Web Apps Safely Binding Unescaped Content in Web Applications Understanding cross-site scripting (XSS) vulnerability, when binding unescaped content is safe, and how to bypass warnings in Angular and Ember.
Technical Practices 5 Ways Atomic Object Keeps Your App Secure Atomic takes security concerns very seriously and uses a number of patterns and practices to ensure that the software we write is safe and secure.
Personal Optimization Understanding the 3 Main Types of Encryption An overview of symmetric encryption, asymmetric encryption, and hashing — how they work and why you need all three to create secure systems.
DevOps & System Admin. Shellshock – CVEs, Patches, Updates, & Other Resources Shellshock endangers un-patched web servers and Linux devices. So what is it? How can you tell if you’re vulnerable? And how can it be addressed?
DevOps & System Admin. Debian and Ubuntu Automatic Security Updates Automatic security updates for Debian and Ubuntu with unattended-upgrades provides an easy way to keep your servers patched against recent vulnerabilities.
DevOps & System Admin. GPG + Git: The pass Password Manager A lightweight password manager leveraging the strengths of GnuPG and Git can help make the password-protected world a little better.
DevOps & System Admin. 9 OpenSSL Commands To Keep Handy OpenSSL commands are used frequently for managing SSL certificates. This reference demonstrates the usage of several key commands and options.
Extracurricular Activities Using an OpenPGP Smartcard with GnuPG How to use GnuPG to transfer subkeys to an OpenPGP Smartcard and use it with OS X for encryption, signing, and SSH authentication.
Extracurricular Activities Generating More Secure GPG Keys: A Step-by-Step Guide How to securely generate a new GPG key and remove the primary key.