misinformation • 8 min read • Spreading Misinformation Using Twitter Blog highlighting how the likes of Twitter can be used as a tool and means to spread false information.…
analytics • 3 min read • Analytics - Why Blog post highlighting my stance of analytics on my personal blog site. Explaining how the information helps me (why I do it), and ways in which readers can prevent use of analytic tracking when viewing my site (as well as potentially others).…
accountability • 5 min read • Dealing with False Positives Blog post outlining ways in which to deal with false positives.…
• 5 min read • Let's Encrypt on UniFi ⚠️Please be aware that these instructions are for Unifi version 2.x. If you would like instructions for version 3.…
vulnerability • 8 min read • Google - Open Redirect Writeup of Google's Meet Open Redirect vulnerability.…
nas • 6 min read • TrueNAS S3 Backup Blog covering how to setup a cloud sync between 2 TrueNAS (FreeNAS) servers, for backup purposes.…
encryption • 5 min read • Why I'm Opposed to Encryption "Backdoor" Proposals Blog post explaining why I'm against the proposed encryption "backdoors".…
mfa • 5 min read • Lost in TOTP Post on how to use Authy to help transfer TOTP instances from one device to another.…
certificate • 9 min read • Reverse Proxies Simple guide to configuring Apache and NGINX as reverse proxies for HTTPS.…
certificate • 6 min read • Self-Host ACME Server Blog post covering how to setup a private, internal ACME server.…
blog • 4 min read • GitHub Pages Post explaining how to setup GitHub Pages and practical uses of it.…
• 3 min read • 1Password Investigation Brief investigation into 1Password and how it handles your secrets.…