cipher

Péter Budai on End to End Encryption

Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption.

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises. First book is complete, second book is content complete and currently in technical review.

Risks and Countermeasures to the Management of Application Secrets

Redirects to legacy blog post.

OpenSSH from Linux to Windows 7 via tunneled RDP

Redirects to legacy blog post. In this article I’ll go over getting Kali Linux installed and set-up. I’ll go over a few of the packages in a low level of detail (due to the share number of them) that come out of the box. On top of that I’ll also go over a few programmes I like to install separately. In a subsequent article I’d like to continue with additional programmes that come with Kali Linux as there are just to many to cover in one go.