You need multiple AWS accounts for hacking. This guide will show you how, using AWS Organizations and SSO.
Posts by Year
A gunshot detector can be made with 99% accuracy for under $100. Can we use this technology to help contain gun violence?
I wanted to consolidate two websites into a single, new Ghost platform. Re-using one of the existing URLs, and having the site behind the CloudFlare CDN caus...
Using LastPass Identities with browser profiles can help keep online identities separate and increase security.
So having survived my first book pitch, I wanted to share some of what I learned. I pitched to Laura Zats, who was brilliantly brutal, amazing, and I learned...
A practical guide to opt out of pervasive data gathering by setting up an alternate online identity.
Review of the Purism Librem 13 laptop for running Qubes OS
How to set up a malicious ldap server to capture credentials during a penetration test
Using a custom TP-Link pocket router, OpenWRT and a privacy VPN to protect your privacy on untrusted networks like hotels and coffee shops.
When traveling, Internet access in hotels is totally insecure. You can’t trust they’ve done it right. So this guide helps you create your own travel router t...