TOR is a network within the internet created for extreme security which has a lot of features for anonymization. So, it’s a way to browse the internet anonymized, unrecognized and hidden from the authorities. In this post I’m going to access TOR and its onion addresses with Linux Ubuntu.
Continue reading Step by step access to TOR network with Tails using VirtualBoxCIA Triad and Encryption Examples
In ICT-security related matters CIA Triad stands for Confidentiality, Integrity and Availability. These are the core principles that categorize most of the security issues threatening information technologies.
Continue reading CIA Triad and Encryption ExamplesWebGoat Access Control Flaws and Dangers of Eval
In this post I’ll try out four different WebGoat assignments and analyze them in relation to OWASP 10 and the real world.
Continue reading WebGoat Access Control Flaws and Dangers of EvalStrategic approach on ICT security
The way of operationally approaching ICT security discussions with executives has become obsolete. Operational means acting on threats, vulnerabilities, risks and audits as they come and interacting with the organization with references to the details of the security issues. This style of approach is valid for smaller organizations but even for small organizations it can become quite overwhelming.
Continue reading Strategic approach on ICT securitySecurity incident of Zoom video conferences’ video files found from a search engine
On April 3, 2020, Washington Post reported of a security incident of saved videos of Zoom video conferencing tool found in a search engine.
The videos were stored in a separate online storage that was accessed by a search engine which then listed all of the videos in there into its records of web pages. Apparently the storages were publicly available Amazon Web Services’s file buckets.
Continue reading Security incident of Zoom video conferences’ video files found from a search engineMain points of TOGAF
TOGAF is a enterprise architecture standard that is fully free and open for any organization to use. It is developed by The Open Group and the first version was published in 1995. The standard is full and works fine on its own but most organizations tend to use just parts of it or just certain part to fill their enterprise architecture models. The development group consists of a wide spectrum and the result represents the needs of the whole community of these stakeholders.
Continue reading Main points of TOGAFGlobal variables with less-loader in Webpack
Less is a compiler that produces css files. It is usually used with webpack or some other tool that automates development procedures. With webpack one usually uses less-loader which loads all the less files and compiles them to one css file (this is the default usage).
Continue reading Global variables with less-loader in WebpackTerraform: Quoted type constraints are deprecated
This warning:
Interpolation-only expressions are deprecated on somewhere.tf line 165, in variable "some_variable": 165: type = "list"Continue reading Terraform: Quoted type constraints are deprecated
Terraform: Interpolation-only expressions are deprecated
Terraform is updating constantly and code styles are getting reworked all the time. This update was a very good one and you should definitely start using it as it makes your code more readable.
Continue reading Terraform: Interpolation-only expressions are deprecatedSimple String as JSON from Spring Rest Controller in Kotlin
Spring or Spring Boot usually by default transforms items to JSON. However if you return simple String like “cool” then that is not turned into JSON like here.
@GetMapping("/cool")
fun cool(): String {
return "cool"
}
Continue reading Simple String as JSON from Spring Rest Controller in Kotlin