In this article, we will setup and demonstrate the two Port Forwarding options (Local and Reverse) on Linux using a single binary executable called ‘Chisel‘. Here is the link to the article:
Enjoy 🙂 !!!
Articles | Notes | Tips | Tutorials
In this article, we will setup and demonstrate the two Port Forwarding options (Local and Reverse) on Linux using a single binary executable called ‘Chisel‘. Here is the link to the article:
Enjoy 🙂 !!!
In this article, we will introduce the concept of Zero Knowledge Proofs (ZKP) and look at one of the earlier ZKP schemes proposed by Amos Fiat and Adi Shamir, along with a simple proof-of-concept.
Here is the link to the article:
Fiat-Shamir Zero Knowledge Proof
Enjoy 🙂 !!!
Just recently experimented with the use of Pi-hole (running on an ARM based SBC) as the Network-wide Ads and Internet Tracking blocker.
This article provides the step-by-step instructions to get Pi-hole running on Docker.
Here is the link to the article:
Pi-hole using Docker on ODroid-C2
Enjoy 🙂 !!!
In this article, we will introduce the mathematical concept behind Elliptic Curves with some examples and its usage in Cryptography.
Here is the link to the article:
Enjoy 🙂 !!!
In this article, we will setup and learn how to work with the Nmap network scanning tool on a Linux host and explore the core concepts. Here is the link to the article:
Enjoy 🙂 !!!
In the traditional Unix world, the typical way to grant a command (executable file) the superuser (root) privileges is to enable the SUID bit and have it owned by root. Look at the permission of the ping command in Linux – it does *NOT* have the SUID bit set and yet is able to open a raw socket connection … curious to know more ???
Here is the link to the article:
Enjoy 🙂 !!!
Wish you all a Happy, Healthy, Prosperous, & Peaceful 2021 …
In this article, we will setup and demonstrate the HashiCorp Vault for managing and controlling access to sensitive enterprise assets such as Passwords, Access Tokens, Certificates, etc., on a 3-node VirtualBox based VMs. Here is the link to the article:
Enjoy 🙂 !!!
In this article, we will setup and learn how to work with the Linux iptables firewall using 3 VMs on a Linux host and explore the core concepts. Here is the link to the article:
Fundamentals of Linux iptables Firewall
Enjoy 🙂 !!!
In this article, we will setup and demonstrate the different SSH Tunnel options using 3 VMs on a Linux host and explore the core concepts. Here is the link to the article:
Enjoy 🙂 !!!
OAUTH2 and OpenID Connect are popular Authorization and Authentication mechanisms and a lot of confusion around these standards.
In this article, we will unravel the OAUTH2Â and OpenID Connect standards and practically demonstrate the various flows.
Here is the link to the article:
Understanding OAuth2 and OpenID Connect
Enjoy 😉 !!!