Amazing (Physical) Access Control with HID RFID cards


Revising my lazy http/https interception setup
Fun Hacking Stuff ahead


How (NOT) to hide OpenVPN behind HTTPS/SSL
GnuPG/PGP and Evolution/Seahorse Private Key Woes
Firejail: Chroot on Speed


pathogen vs vundle


Migrating to Middleman
Capybara for automating Pen-Tests
Using a (host) reverse-proxy together with LXC application servers
How to convert an KVM image into a LXC container
How to use virt-install to install new virtual machines within libvirt/kvm
Rogue Access Point and SSL Man-in-the-Middle the easy way
How-to setup a rogue access point with a transparent HTTP(s) proxy


How to use FakeS3 for S3 testing
Linux: How to force an application to use a given VPN tunnel
Git with transparent encryption
Secure Online Data Backup using Duplicity


Avoiding Internet/Network Surveillance
Linux: How to encrypt your data on hard drives, USB sticks, etc.
Linux: How to forward port 3000 to port 80
Postgres: Howto change owner for all tables
Moving OctoPress to Amazon S3 and CloudFront
A full-powered shoebox-sized Desktop