1. Router/Firewall Using Docker with LXC and OpenVSwitch

    Software vulnerabilities ranging from buffer overflows leading to privilege escalations, to actual malware camouflaged as a software update, can easily compromise a Linux host, particularly when it's used as a router. Most Linux-based routers out there run all their services as standard processes in user space, which makes the ...


  2. Going Static

    One reason why I had stopped posting anything in my blog for a while was my frustration on how slow the Wordpress back-end for Dreamhost “economy users” is, you know, the ones with the most basic plans.

    I guess they must have realized that, since they are starting a new ...


  3. Facebook No More

    I resisted joining Facebook for quite some time, not because I’m a Luddite or an old timer, but rather because I know better than most people what goes on underneath the surface of such type of platforms. I also know well what happens to companies that become public and ...


  4. Selecting the Right VPN Service

    For the record, I’m a CISSP, and as such, computer security is always in the top of my mind.

    Since I spend a good amount of time at airports, hotels, coffee shops and generally roaming around, having a VPN service has become a necessity for me as well as ...


  5. Why I Don't Use Gmail

    I’ve never been very fond of keeping something as sensitive as my personal email in a service provider. I used to run my own email server at home based on Zimbra a few years back, but like everything else, it became cumbersome. Updates, backups and having to deal with ...


Page 1 / 1