Addressing storage performance, resiliency, and efficiency using ZFS.
Creating new objects in Kubernetes dynamically from user-supplied manifests.
How I collapsed all of my workloads onto one machine using a recursive build.
How passwords should be generated and managed using proper cryptography.
Understanding buffer overflows and their security consequences with a showcase of vulnerable code and its exploitation.
A look into how you can harden Linux and improve the security of your environment.
A look at the execution time and memory usage taken by six different languages to run through a very large binary search tree.
An in-depth overview of the SSL and TLS protocols, the encryption behind them, and what the NSA is and isn't able to do with data encrypted by them.
A quick analysis of rootkits, what they are, how they work, and how they can be removed with special tools.
A simple tool that counts the number of characters given.
Generates hashes from the supplied text. Supports NTLM, LM, MD5, SHA1, MySQL, Cisco, LDAP, and many more.
Hexadecimal generation supporting strings and decimals.
Measures the search space, length, combinations, and complexity of a password. Also evaluates the strength of the password based on multiple attack scenarios.