Skip to content

Vault

Balance Beyond the Grind: Navigating Burnout in a Busy World

Ouff, it’s been a while since the last time I wrote anything. I will begin by saying that teaching at college has been challenging, rewarding, but also time-consuming. As I prepared a class a month away from the finish line, I realized I have been spending my weekends entirely doing research, preparing schoolwork, and grading assignments; I have stopped doing the things that I enjoy doing. This brings me to contemplate life from a different angle.


Automation in the classroom! PART II - Marking assignments with the help of Docker containers

In part one, we explained the basic concepts and technologies used for the initial setup. This part of the article will take on the second half missing: Docker containers! Specifically, Nginx image for hosting single repos within a "Docker service." I think it is super cool, and I wonder if there is a better way. If you stumble upon this article and want to fork my repo, please do so.


Automation in the classroom! PART I - Basics & Set-up

Starting as a college teacher has been very rewarding. I've found students eager to learn and their "sponge-like" minds ready to take on the world. I am honored still to have been given this opportunity; I look forward to seeing how far some of them will reach and what they will achieve in their lifetimes.

I want to give a brief of what this article is about. As I progress with my writing, I will keep it simple and explain each of the little elements or bits of separate technologies on which I will be dwelling in my write-ups.


Dark Magic & Daemon Summoning with Bash Scripting

Starting teaching at college has been very rewarding; however, I still long for world domination like everyone else. I have encountered that teaching 30+ students is no easy task, and on top of that, marking? It ends up being time-consuming and a task that could be more enjoyable. But then I thought, "Hey, what about creating a script that helps me in my day-to-day life? After all, I'm a Dark Wizard with computing resources. Hell, I'll put those Daemons to work!" so I took on more digging on bash scripting! I already have basic knowledge and implement bash scripting on my RECON machine for Security Research. I will document my findings on Bash and the problems it helps me solve as I go with them. And ultimately build an army of scripts to help me achieve my goal of world domination! :)

Summon evil hell minions like a pro with Bash scripting!


Stored XSS

Understanding Stored Cross-Site Scripting (Stored XSS)

Recapping the previous article into the world of XSS basics—covering DOM-based, stored, and reflected XSS—we’re now ready to zoom in on one particular type:


Installing Docker engine for Linux distributions

I recently started a project involving docker containers and their "network" capabilities. It is exciting to play with it, and I decided to share the steps where I find I've needed help to maybe aid others in my position. So, to start this set of articles, we will do it from the beginning.

Installing Docker on our Linux distro of preference.


Cross-Site Scripting (XSS) - Basics and Prevention

Understanding Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is a type of web security vulnerability where malicious scripts are injected into trusted websites. Hackers take advantage of web applications with poor input validation or encoding errors, which can lead to significant security risks. When a user visits the compromised site, the browser unknowingly executes the injected script, giving the attacker access to sensitive information such as cookies and session tokens.


Avoid IDOR bugs PART II

Developer Responsibility and Security Awareness

As developers, we are responsible for the following:

  • Write clean, understandable, and maintainable code.
  • Make code that speaks for itself. (AKA: no comments)
  • Name things properly — variables good, vague names bad.

But we are only human; despite what many might think, we all make mistakes. Those mistakes show up as issues during an application's usage.
The dreaded bugs!
We can't avoid introducing them sometimes, but we can reduce them with good practices.


The Crucial Role of White Hat Hackers and Crowdsourced Platforms in Enhancing Online Security

In today's digital world, ensuring the security of our online environments is crucial. With cyber threats becoming increasingly common, ethical hackers and innovative platforms such as Bugcrowd and HackerOne have formed a unique partnership shaping cybersecurity's future. These platforms act as virtual battlegrounds where security experts, known as white hat hackers, utilize their skills to strengthen digital defenses and protect sensitive information.