LogoFAIL Vulnerabilities
Critical bugs allow attackers to bypass Secure Boot and install persistent firmware bootkits on devices. They exploit the image-parsing libraries
How I use Cloudflare Zero Trust - Tunnels - to host this blog
Cloudflare tunnels are a secure and convenient way to connect your web applications to Cloudflare’s network without exposing them
Why I chose Checkmk as my monitoring platform?
Checkmk is a comprehensive platform for monitoring applications, servers, and networks, whether on-premises or in the cloud. It is equipped
Some notes about Google Workspaces Exploits
Researchers have found several ways to exploit Google Workspace and Google Cloud Platform features to conduct ransomware, data exfiltration, and
Mirai - botnet
A new Mirai-based botnet exploits a zero-day vulnerability in thousands of routers and cameras from various brands. The vulnerability allows
SSHFS: A Small Guide for Ubuntu Users
SSHFS, or Secure Shell Filesystem, is a powerful tool that uses SSH to enable the mounting of a remote filesystem
DevOps – SRE – Platform Engineering
Growing voices are saying DevOps is Dead. At the same time, the search for Platform Engineers seems to be picking up. And I am sure we all came across organisations harbouring talented Service Reliability Engineers.
Working Remotely, an honest opinion
💡Disclaimer: I originally wrote this Article in March 2016. So, way before the rise of working from home ;)
I have
A bit of thought about RAID.
💡Disclaimer: I originally wrote this article in September 2021
I was often confronted with people’s assumptions about RAID arrays
btop: A Powerful and Customizable Resource Monitor for Linux
The command btop is a powerful and customisable resource monitor for Linux. It provides a comprehensive overview of system resource