My First CVE, and the Dangers of Over-Logging2023-03-08·4 minsIxonaeSecurity Research Reverse Engineering Vulnerabilities
Home Network and pfSense Configuration Improvements2022-12-26·6 minsIxonaeNetworking System Administration
How To Protect Your Self-Hosted Services Behind WireGuard2022-12-11·7 minsIxonaeSystem Administration Security Networking
Why I (Partially) Self-Host My Emails And Don't Use E2E Email Providers2022-11-14·7 minsIxonaeSystem Administration Privacy
VPN and DNS Leaks - What Are Their Consequences and How to Detect Them2022-10-29·5 minsIxonaeNetworking Security
Protect Your Home Network With pfSense - A Simple Walk-Through2022-06-10·14 minsIxonaeNetworking Privacy System Administration
Configure a Raspberry Pi as a Secure WiFi Access Point with OpenWrt2022-05-07·6 minsIxonaeNetworking Security System Administration Privacy
Cell Towers: How They Can Be Used to Track Your Movements (Now and in the Past)2021-11-25·14 minsIxonaePrivacy Forensics
Image Forensics and OSINT: Getting Intelligence from Pictures2021-11-04·8 minsIxonaePrivacy Forensics OSINT
Reading Notes: Cybersecurity Career Master Plan: Techniques and tips to advance in your cybersecurity career2021-10-28·10 minsIxonaeReading Notes