crypto

Péter Budai on End to End Encryption

Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption.

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises. First book is complete, second book is content complete and currently in technical review.

Risks and Countermeasures to the Management of Application Secrets

Redirects to legacy blog post.

GnuPG Key-Pair with Sub-Keys

Redirects to legacy blog post. There are quite a few other posts on this topic, but my set-up hasn’t been exactly the same as any I found, so I found myself using quite a few resources to achieve exactly what I wanted.

Installation and Hardening of Debian Web Server

Redirects to legacy blog post. These are the steps I took to set-up and harden a Debian web server before being placed into a DMZ and undergoing additional hardening before opening the port from the WWW to it. Most of the steps below are fairly simple to do, and in doing so, remove a good portion of the low hanging fruit for nasty entities wanting to gain a foot-hold on your server-network.