Tech and security blog
Upgrading from iptables to nftables for logging
Building a memory forensics workstation
Using raw QEMU options to mask CPU features
Authenticate TCP connections using RFC 2385