Latest Articles

Resilient, Performant Persistence

Addressing storage performance, resiliency, and efficiency using ZFS.

Dynamic Kubernetes Programming - Part 1

Creating new objects in Kubernetes dynamically from user-supplied manifests.

The Great Consolidation - Recursive Homelab Build

How I collapsed all of my workloads onto one machine using a recursive build.

Generating and Managing Passwords

How passwords should be generated and managed using proper cryptography.

Buffer Overflows

Understanding buffer overflows and their security consequences with a showcase of vulnerable code and its exploitation.

Hardening Linux

A look into how you can harden Linux and improve the security of your environment.

Binary Search Trees - Measuring Six Different Languages

A look at the execution time and memory usage taken by six different languages to run through a very large binary search tree.

The NSA and SSL/TLS

An in-depth overview of the SSL and TLS protocols, the encryption behind them, and what the NSA is and isn't able to do with data encrypted by them.

Rootkits - Detection and Removal

A quick analysis of rootkits, what they are, how they work, and how they can be removed with special tools.


Latest Tools

Character Counter

A simple tool that counts the number of characters given.

Hash Generator

Generates hashes from the supplied text. Supports NTLM, LM, MD5, SHA1, MySQL, Cisco, LDAP, and many more.

Hex Generator

Hexadecimal generation supporting strings and decimals.

Password Endurance

Measures the search space, length, combinations, and complexity of a password. Also evaluates the strength of the password based on multiple attack scenarios.