Welcome!
The intent of this blog is twofold: publish, mainly, security-related issues that I come across in my day-to-day along with their solutions as well as a brief explanation of what's going on behind the scenes. The second objective is to clarify security concepts that might be sometimes confusing and messy.
Why so?
Anyone who works with computers knows that such complex machines are not "straighforward" at all in the sense that your objectives are most of the times not achieved because of unforeseen incidents along the way. For such reason I want to help out those people who sometimes get stuck with completing their tasks and don't know how to continue. Those hurdles might be a break on our final goals.
Google is largely the go-to tool to resolve all your uncertainties/troubles. It is most of the times tremendously useful but the other few times can be a pain in the neck because there are tons of information about one specific matter out there on the Internet. Besides, many times you search on google for a solution you end up having countless of open tabs blowing up your mind. My intention is to try to get you out of those troubles/obstacles. I also want to point out that all of the examples published in each article are truly reproduced by myself.
On the other hand, as a security enthusiast and practitioner I think that lots of the existing security concepts can be sometimes ambiguous and difficult to truly understand. Because of this I will also try to publish articles clarifying/explaining messy security concepts that I find interesting in the best way possible.
I hope you find this site useful somehow. I will try to do my best and cover the fundamentals in each of the articles to HELP YOU OUT.
The intent of this blog is twofold: publish, mainly, security-related issues that I come across in my day-to-day along with their solutions as well as a brief explanation of what's going on behind the scenes. The second objective is to clarify security concepts that might be sometimes confusing and messy.
Why so?
Anyone who works with computers knows that such complex machines are not "straighforward" at all in the sense that your objectives are most of the times not achieved because of unforeseen incidents along the way. For such reason I want to help out those people who sometimes get stuck with completing their tasks and don't know how to continue. Those hurdles might be a break on our final goals.
Google is largely the go-to tool to resolve all your uncertainties/troubles. It is most of the times tremendously useful but the other few times can be a pain in the neck because there are tons of information about one specific matter out there on the Internet. Besides, many times you search on google for a solution you end up having countless of open tabs blowing up your mind. My intention is to try to get you out of those troubles/obstacles. I also want to point out that all of the examples published in each article are truly reproduced by myself.
Why so?
Anyone who works with computers knows that such complex machines are not "straighforward" at all in the sense that your objectives are most of the times not achieved because of unforeseen incidents along the way. For such reason I want to help out those people who sometimes get stuck with completing their tasks and don't know how to continue. Those hurdles might be a break on our final goals.
Google is largely the go-to tool to resolve all your uncertainties/troubles. It is most of the times tremendously useful but the other few times can be a pain in the neck because there are tons of information about one specific matter out there on the Internet. Besides, many times you search on google for a solution you end up having countless of open tabs blowing up your mind. My intention is to try to get you out of those troubles/obstacles. I also want to point out that all of the examples published in each article are truly reproduced by myself.
On the other hand, as a security enthusiast and practitioner I think that lots of the existing security concepts can be sometimes ambiguous and difficult to truly understand. Because of this I will also try to publish articles clarifying/explaining messy security concepts that I find interesting in the best way possible.
I hope you find this site useful somehow. I will try to do my best and cover the fundamentals in each of the articles to HELP YOU OUT.
No comments:
Post a Comment