06-11 Switching a Xiaomi Mi Mix 2s to LinageOS (Android 9)
05-30 Building an LTE Access point with OpenWRT Rooter
05-22 To Fuzz a WebSocket
05-16 JWT: Signature-vs-MAC attacks
01-07 On Reframing
01-04 Amazing (Physical) Access Control with HID RFID cards


12-31 This year's review, 2018 edition
12-13 Wireguard vs OpenVPN on a local Gigabit Network
11-23 Revising my lazy http/https interception setup
11-07 Living with changes
10-23 Fun Hacking Stuff ahead


12-01 How (NOT) to hide OpenVPN behind HTTPS/SSL
12-01 GnuPG/PGP and Evolution/Seahorse Private Key Woes
02-27 Secret-sharing described by Prismacloud
02-25 Low-hanging Security/Privacy for the Lazy 2016!
02-25 Firejail: Chroot on Speed
02-07 OSCP: Check!


11-13 Network Concurrency Problem
02-18 pathogen vs vundle


09-09 Review: Penetration Testing with BackBox
09-09 Migrating to Middleman
09-09 Capybara for automating Pen-Tests
04-25 Using a (host) reverse-proxy together with LXC application servers
04-07 How to convert an KVM image into a LXC container
03-22 How to use virt-install to install new virtual machines within libvirt/kvm
03-20 Rogue Access Point and SSL Man-in-the-Middle the easy way
02-24 How-to setup a rogue access point with a transparent HTTP(s) proxy
01-26 Politics: there seems to be no middle anymore
01-05 Luxury is Slavery


12-31 Review and New Year's resolutions
12-29 Cleaning Up
12-24 Indulgence Galore!
12-24 How to use FakeS3 for S3 testing
10-20 Linux: How to force an application to use a given VPN tunnel
10-10 Git with transparent encryption
06-27 Secure Online Data Backup using Duplicity
06-27 Encrypted S3 storage filesystems
06-23 Penetration testing


12-10 Avoiding Internet/Network Surveillance
12-02 Linux: How to encrypt your data on hard drives, USB sticks, etc.
11-18 Linux: How to forward port 3000 to port 80
11-11 Postgres: Howto change owner for all tables
11-03 Moving OctoPress to Amazon S3 and CloudFront
10-28 The Lazy Engineer
10-28 A full-powered shoebox-sized Desktop
05-01 Generating PDFs with wicked_pdf