Computers

Green misty morning

A convenient homelab SSH jumphost (without the drama)

Managing a homelab is all fun and games until you’re knee-deep in IP addresses, SSH keys, and trying to remember if this server was the one with Kubernetes or the one you broke last Tuesday. SSH-ing into multiple machines gets messy fast – unless you love memorizing IPs and usernames like some sort of 2000s hacker movie […]

Read More
Green green green

Proxmox firewall layers in simple terms

Proxmox VE is a phenomenal open-source virtualization platform that many of us (myself included) absolutely love. It’s powered by a strong community, and the fact that we can use it for free in our home labs or even in small production environments is a huge blessing. In my early days with Proxmox, I struggled a bit […]

Read More
Green parrot on a tree having lunch

Passkeys – the future of secure authentication

As a long-term fan of Yubikeys, I quickly got curious about this relatively new concept called “passkeys“. Big companies like Apple, Amazon, and Mastercard are nudging their users to adopt passkeys and use them instead of passwords. The “instead of passwords” part really got me curious! Since forever, passwords have been a part of our […]

Read More
Landscape photo of Scottish Highlands

Say “yes” to SBOMs!

Picture this: your software application is running smoothly in production, serving thousands of users. Then, you hear about a new critical vulnerability affecting open-source libraries, and panic sets in. Is your application exposed? If so, which part is at risk? Without a clear map of your software’s components, answering these questions can feel like searching […]

Read More
Bench

Is my business secure? First look at the SAMM framework

Security is becoming more important for businesses operating in an increasingly complex landscape of cyber threats and data breaches. Small businesses often don’t have the advanced security measures and resources that larger enterprises possess, making them particularly vulnerable targets for cyberattacks.  A breach can result in significant financial losses, reputational damage, and legal liabilities, which […]

Read More
Top title image

Solving the WebStrike Blue Team Challenge

The challenge In the intricate world of cybersecurity, every attack leaves behind digital footprints waiting to be deciphered. In this post, we embark on a brief journey to unravel a cyber threat, dissecting each element that reveals an attacker’s origin, tactics, and motives. Let’s dive in. The challenge is presented by CyberDefenders (https://cyberdefenders.org) and can […]

Read More
Crimediggers website screenshot

Crimediggers: solving the cyber challenge

Crimediggers is a promotional escape game brought out by the Dutch police. It’s a very high-quality, realistic challenge and generally aimed at recruiting digital specialists for the police’s cybercrime teams. Completing Crimediggers requires previous knowledge in the computer security domain. In this post, I share my path of progressing through the challenges. Solutions to the […]

Read More