Victoria Drake
So you're the family tech supportPrivacy and online security to-dos for the home-for-the-holidays tech support hero.
privacy
☕️
2 min read
Victoria Drake
OWASP Web Security Testing Guide v4.2 releasedAnnouncing the release of a new version of the OWASP WSTG.
cybersecurity
☕️
2 min read
Victoria Drake
Build your own serverless subscriber list with Go and AWSHow to build your own newsletter list with DynamoDB and SES email sign up confirmations.
api
☕️ ☕️
7 min read
Victoria Drake
WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi security explainedWhich one should you be using? Why Wi-Fi security matters.
computing
☕️ ☕️
8 min read
Victoria Drake
Three rules for choosing a VPN that takes your privacy seriouslyThe lesser-known risks of ISPs and why I chose ExpressVPN.
privacy
☕️ ☕️
6 min read
Victoria Drake
Your cybersecurity starter packBasic security best practices to share with your non-technical friend.
cybersecurity
☕️ ☕️
7 min read
Victoria Drake
What is TLS? Transport Layer Security encryption explained in plain englishHow TLS, digital certificates, and sessions help keep communications secure.
cybersecurity
☕️
5 min read
Victoria Drake
Look mom, I'm a GitHub Action HeroThe GitHub blog interviews me for their GitHub Action Hero series.
ci/cd
☕️
5 min read
Victoria Drake
How to choose and care for a secure open source projectA few tricks for assessing the security of an open source project.
open-source
☕️ ☕️
8 min read
Victoria Drake
If you want to build a treehouse, start at the bottomHow threat modeling and pushing left help create a stable foundation for secure software.
cybersecurity
☕️
5 min read
Victoria Drake
Outsourcing security with 1Password, Authy, and Privacy.comTake some work off your plate while beefing up security with three changes you can make today.
cybersecurity
☕️
5 min read
Victoria Drake
Breaking bottlenecks 🍾A talk on the benefits of non-blocking functions for programs, developers, and organizations.
computing
☕️ ☕️ ☕️
12 min read
Victoria Drake
Three healthy cybersecurity habitsThree helpful cybersecurity new year resolutions. Happy holidays!
cybersecurity
☕️
4 min read
Victoria Drake
Secure web forms for the front-end developerHow to design secure web forms: validate, sanitize, and control.
cybersecurity
☕️
4 min read
Victoria Drake
The surprisingly difficult task of printing newlines in a terminalYour guide to string interpolation quirks that confound the best of us.
terminal
☕️
4 min read
Victoria Drake
The care and feeding of an IoT deviceWhy IoT devices are, basically, puppies, and whether or not you should give somebody one for Christmas.
cybersecurity
☕️
4 min read
Victoria Drake
A cron job that could save you from a ransomware attackHow a simple scheduled job can help you quickly recover from ransomware.
cybersecurity
☕️ ☕️
7 min read
Victoria Drake
Secure application architecture basics: separation, configuration, and accessA starting point for building secure application architecture, for busy developers.
cybersecurity
☕️ ☕️
8 min read
Victoria Drake
How users and applications stay safe on the Internet: it's proxy servers all the way downAn overview of how proxy servers form the basis of online anonymity, and how their use in various forms helps both users and web applications.
cybersecurity
☕️ ☕️
9 min read
Victoria Drake
Hackers are Googling your plain text passwords: preventing sensitive data exposureWhy sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.
cybersecurity
☕️ ☕️
8 min read
Victoria Drake
SQL injection and XSS: what white hat hackers know about trusting user inputA primer on SQL injection and cross site scripting, and how to handle user input in software development.
cybersecurity
☕️ ☕️
11 min read
Victoria Drake
How to set up OpenVPN on AWS EC2 and fix DNS leaks on Ubuntu 18.04 LTSA guide for setting up your own private VPN service, and understanding and fixing a DNS leak.
aws
☕️ ☕️ ☕️
14 min read