Good day friends and colleagues, When I say CIA, I am obviously not talking about the agency but about the cyber security triad: Â Confidentiality, Integrity
Complex routing with OpenBSD
We had to solve a routing problem for a non common network setup. I won’t get into details on why we chose to do it
Restrict SSH logins to a single command
OpenSSH provides a way to limit what a user is able to execute on a remote host. This feature can be used to create users
Secure password hashing: why we need it
Nobody likes passwords. Especially when you receive your password in clear text after hitting “forgot my password”—evidence that the server stores the password either in