Search by tag: security

2024

25

Oct

The Paradox of Privacy in the Digital Age

Having a philosophical moment thinking about my own privacy, I took a trip back through the history of the concept “privacy” by following the simple question: “Do you have privacy?”

Read more

03

Sep

Chat in the Shadows: Dark IRC on Linux for Maximum Privacy

So, you’ve heard about the Telegram fiasco, right? The big guy in charge got thrown in the slammer in France, and everyone started panicking about who’s really in control of our messages. If that doesn’t scream, “Hey, maybe don’t trust centralized platforms,” then I don’t know what will. But don’t worry! This guide is here […]

Read more

01

Feb

History of computer viruses

Unveiling the Evolution: A Historical Journey through Computer Viruses

Exploring the evolution of computer viruses from the 1970s to present times, where I discuss the continuous battle between ever-evolving cyber threats and advancing cybersecurity. From pioneering malware like Creeper and Brain to the widespread destruction caused by I Love You and SQL Slammer, each era demonstrates escalating sophistication and societal impact, emphasizing the need for proactive security measures, education, and global collaboration to combat and adapt to these persistent cyber threats.

Read more

2023

23

May

Python virus for fun and profit

Can you write a self-replicating virus in python? I gave it a try.

Read more

2022

26

Jan

CVE-2021-4034 – my PoC for PwnKit

I made a Proof of Concept exploit (two actually) for the new Polkit CVE posted yesterday. Find a description and code here.

Read more

2021

04

Jun

Who shares private social security number online?!?!

Have you ever shared a picture of your Danish social security card (in Danish: sundhedskortet) online? Maybe with a finger across to cover the secret number?
Think you’re safe from identify theft? probably not!

Read more

2019

23

Aug

Using SoloKey for Linux Login

If you want to have extra security for your linux machine besides the usual password. Then get yourself a SoloKey or other hardware U2F key and use that as secondary login. Here I give you the description on how to install and configure everything for using Solokeys with your linux. Enjoy!

Read more