Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
With the need for home offices during the pandemic lockdown, provisional solutions instituted on the fly during the transition from office to home require more permanent solutions, especially for securing TLS connections on the Internet.
We compare three popular packages that are designed to simplify teamwork: EGroupware, Group Office, and Kopano.
We compare seven free blocking filters for advertisements and look at how they integrate into the network.
AWS GuardDuty uses machine learning and threat intelligence to identify malicious activity for continuous security monitoring in the cloud.
Vault is a highly secure, trusted place to keep your secrets and certificates.
Intruders slip in when end users get sloppy. Check the health of your endpoint devices with Stethoscope.
PowerShell is not the usual go-to tool for pentesting, but it can reveal IT vulnerabilities that suggest a more considered use of the tool.
Bufferbloat impedes TCP/IP traffic and makes life difficult, especially for real-time applications like voice or video.