
Accessing Git and Nexus with custom SSL certificates
Again and again I work for companies having self crafted certificate. In 2020 there is no excuse...
Read Moreby Cédric Walter | Oct 8, 2020 | Development | 0 |
Again and again I work for companies having self crafted certificate. In 2020 there is no excuse...
Read Moreby Cédric Walter | Mar 14, 2020 | Linux | 0 |
Port Knocking is a technique to secure services behind a firewall until a specific knock sequence...
Read Moreby Cédric Walter | May 30, 2019 | Development | 0 |
Security token offering (STO) is a type of fundraising that is performed with a company...
Read Moreby Cédric Walter | Aug 22, 2018 | Development | 0 |
introduction This is my attempt to list all possible blockchain consensus out there, I welcome...
Read Moreby Cédric Walter | Jul 10, 2018 | Development | 0 |
The innovation speed in Blockchain landscape is just breathtaking and being able to (or to be...
Read Moreby Cédric Walter | Apr 1, 2018 | Development | 0 |
Bob did a lot of (obvious) mistakes, but you will still be able to learn a lot by going through...
Read Moreby Cédric Walter | Sep 11, 2013 | Linux | 0 |
An exploited or hacked server is one that is no longer fully under your control and someone else...
Read Moreby Cédric Walter | Feb 5, 2012 | Linux | 0 |
Thanks to Nathan Rennie-Waldock. you can have the latest PHP5 5.3.10 running in #Ubuntu Oneiric,...
Read Moreby Cédric Walter | Jan 29, 2012 | Linux | 0 |
This script is working on all #Linux standard distribution, but use at your own risk! The script...
Read Moreby Cédric Walter | Sep 28, 2009 | Internet | 0 |
The hosts file is a computer file used by an operating system to map hostnames to IP addresses....
Read Moreby Cédric Walter | Sep 7, 2008 | Security | 0 |
First let’s refresh some definitions…set user ID (SUID) The SUID permission causes a...
Read Moreby Cédric Walter | Oct 28, 2007 | Security | 0 |
If you are on the paranoia side, and you better should, if you’re using ebanking on an...
Read More