Skip to content

Braveterry

My informations: Let me show you them

  • About

Recent Posts

  • Pushbullet: Move information among your devices
  • Vault: Tool for Secure Secret Storage written in Go
  • Link: Building a Shop with Sub-Second Page Loads: Lessons Learned
  • Link: I Miss Being Part Of A Complete Team
  • The Jupyter Notebook: Web app for creating and sharing docs with live code, equations, visualizations & explanatory text.

Tags

  • api
  • books
  • browser
  • cms
  • command-line
  • css
  • database
  • dependency-management
  • documentation
  • framework
  • git
  • go
  • html
  • java
  • javascript
  • json
  • library
  • markdown
  • messaging
  • micro-services
  • mobile
  • node.js
  • opensource
  • operations
  • performance
  • perl
  • php
  • podcast
  • programming language
  • python
  • rest
  • ruby
  • scm
  • search
  • security
  • services
  • software
  • Software Development
  • static-site-generation
  • testing
  • tutorial
  • unix
  • visualization
  • webserver
  • windows

Archives

  • November 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012

Tag: security

Vault: Tool for Secure Secret Storage written in Go

Vault Logo

https://www.vaultproject.io/ ᔥ


  • Vault on GitHub
  • Secret Management with Vault (Using Vault in Production)
Posted on November 18, 2016November 13, 2016Tags golang, security

Personal Security Checklist

Stock Photo: https://pixabay.com/static/uploads/photo/2014/02/13/07/28/security-265130_960_720.jpg

https://github.com/alulsh/personal-security-checklist/blob/master/README.md


Right now it covers:

  • Laptop or computer security
  • Smartphone security
  • Network security
  • Account security
  • 2FA Audit
Posted on November 7, 2016November 4, 2016Tags security

Control your Windows 10 privacy settings with O&O ShutUp10

O&O Shut Up 10 logo

https://www.oo-software.com/en/shutup10


I recently reinstalled Windows 10 on a new PC I built. I used this utility to exercise fine-grained control over my Windows 10 privacy settings, including disabling Cortana.

Posted on September 19, 2016September 18, 2016Tags privacy, security, windows

JSON Web Tokens (JWT) vs Sessions

JSON Web Tokens logo

https://float-middle.com/json-web-tokens-jwt-vs-sessions/

Posted on June 20, 2016June 19, 2016Tags json, security

SSH: Best practices

SSH logo image from wikipedia

https://blog.0xbadc0de.be/archives/300 ᔥ

Posted on February 15, 2016February 14, 2016Tags security

ZeroDB: End-to-end encrypted database protocol

ZeroDB Logo

https://www.zerodb.io/

Posted on February 12, 2016February 11, 2016Tags database, security

Four Things to Do as Soon as You Sign up for AWS

Amazon Web Services Logo

https://medium.com/@rafgarcia/four-things-to-do-as-soon-as-you-sign-up-for-aws-5c095097679f


I ran through this with my AWS account.

Format LinkPosted on January 4, 2016January 3, 2016Tags security, tutorial

How PLEX is doing HTTPS for all its users

Plex logo

https://blog.filippo.io/how-plex-is-doing-https-for-all-its-users/


This is pretty slick.

Posted on June 19, 2015June 14, 2015Tags http, security

Serverauditor: Mobile SSH client for IOS, Android, and Chrome

Serverauditor running on mobile devices

https://serverauditor.com/

Posted on June 9, 2015June 7, 2015Tags command-line, mobile, security

OWASP Authentication Cheat-sheet: Best practices for authentication and session management

OWASP Cheat Sheet masthead

https://www.owasp.org/index.php/Authentication_Cheat_Sheet


Application developers should look through this. It’s a good list.

Posted on February 11, 2015February 8, 2015Tags security

Posts navigation

Page 1 Page 2 Next page
Proudly powered by WordPress