Containerization & Docker Explained

- Posted in Technology Compendium by
What are Containers? Containers are lightweight, standalone, executable packages that include everything required to run a piece of software: code, runtime, system tools, libraries, and settings. [...] Read more

How to fix an obsolete AD Trust

- Posted in How To by
When running a few Active Directory (AD) scans to check for any open vulnerabilities or misconfigurations, I discovered that one of our trusts was marked as not having SID filtering enabled. For [...] Read more

Hypervisors and Virtual Machines (VMs)

- Posted in Technology Compendium by
What is a VM? A Virtual Machine (VM) is a software-based emulation of a physical computer. It can run an operating system and applications just like a physical computer. However, unlike a physical [...] Read more

End-to-End Encryption Demystified

- Posted in IT Security by
Have you ever wondered what it truly means when your favourite instant messaging app proudly proclaims in the chat, "Messages and Calls are End-to-End Encrypted, and nobody, not even company XYZ, can read them"? Is this just marketing? If not, how exactly does this even work? [...] Read more

Two-Factor Authentication (2FA) Demystified

- Posted in IT Security by
You try to log into your favourite social media platform and enter your username and password, only to be greeted with that dreaded message: "An email has been sent to your inbox." Now, you've got to navigate to your email client, wait for the validation token to arrive, and finally get back to what you were doing. It begs the question: Why the extra hassle? Shouldn't a password be sufficient? [...] Read more

No, blurring images is not secure

- Posted in IT Security by
Hands up, we've all been there. You make a quick screenshot using your tool of choice, only to realize something sensitive lurks in the background. No problem, just blur it out, right? Easy fix. If I [...] Read more
Page 2 of 2