Skip to main content

Posts

2023

Goodbye Ghost, Hello Hugo
·6 mins
Ixonae
System Administration
My First CVE, and the Dangers of Over-Logging
·4 mins
Ixonae
Security Research Reverse Engineering Vulnerabilities
Aircraft-Related OSINT: A Simple Guide
·6 mins
Ixonae
OSINT

2022

Home Network and pfSense Configuration Improvements
·6 mins
Ixonae
Networking System Administration
The 32 Best Books I Have Read in 2022
·7 mins
Ixonae
Reading Notes
How To Protect Your Self-Hosted Services Behind WireGuard
·7 mins
Ixonae
System Administration Security Networking
Why I (Partially) Self-Host My Emails And Don't Use E2E Email Providers
·7 mins
Ixonae
System Administration Privacy
VPN and DNS Leaks - What Are Their Consequences and How to Detect Them
·5 mins
Ixonae
Networking Security
How to Use Postfix to Send Emails Through Amazon SES
·6 mins
Ixonae
System Administration
Setup HTTP Basic Authentication with your Spring Boot API
·5 mins
Ixonae
Programming Security
2FA: You're Doing it Wrong
·9 mins
Ixonae
Security
BGP: What Is It And How Does It Work
·12 mins
Ixonae
Networking Security
Protect Your Home Network With pfSense - A Simple Walk-Through
·14 mins
Ixonae
Networking Privacy System Administration
Configure a Raspberry Pi as a Secure WiFi Access Point with OpenWrt
·6 mins
Ixonae
Networking Security System Administration Privacy
Online Accounts Hygiene and Management
·7 mins
Ixonae
Privacy

2021

Cell Towers: How They Can Be Used to Track Your Movements (Now and in the Past)
·14 mins
Ixonae
Privacy Forensics
Taproot Soft-Fork: What Does it Bring to Bitcoin?
·6 mins
Ixonae
Crypto Currencies
Getting Started with NASM Assembly
·14 mins
Ixonae
Programming Reverse Engineering
Image Forensics and OSINT: Getting Intelligence from Pictures
·8 mins
Ixonae
Privacy Forensics OSINT
Reading Notes: Cybersecurity Career Master Plan: Techniques and tips to advance in your cybersecurity career
·10 mins
Ixonae
Reading Notes