Firefox denies that more security is a good idea, and a magazine about computers gets security all wrong.
read moreCipher Suites for Nginx and HAProxy
Choosing cipher suites for use with Nginx and HAProxy.
read moreSSH - Handshakes and Fingerprinting
The inconvenience of (SSH) security, and how to verify your server fingerprints.
read moreThe Second Factor According to Yubico
The numerous protocols (and acronyms) supported by Yubico's various Yubikey authentication devices.
read moreLinux Authorization With a USB Stick
USB memory sticks could be used to authorize to a Linux machine ... but development stagnated and the feature was dropped.
read more'Responsible Disclosure' and Security Vulnerabilities
Consensus opinion on responsible disclosure, and how I may have mishandled it with the Ontario Science Centre.
read moreThe Ontario Science Centre - Fails Computer Science, then fixes itself
Ontario Science Centre draws a huge fail on Computer Science ... but takes note and fixes the problems.
read moreHAProxy for Re-Encrypting Load Balancing
Securing and re-encrypting all your HAProxy traffic.
read moreFun and Games with U2F Keys and Linux
Universal Second Factor (U2F) is (almost) here, and it's pretty good.
read moreAnsible Vault
Save your deploy secrets (API keys, etc.) in your repository by encrypting them with ansible-vault.
read more