How users and applications stay safe on the Internet: it's proxy servers all the way down
An overview of how proxy servers form the basis of online anonymity, and how their use in various forms helps both users and web applications.
Hackers are Googling your plain text passwords: preventing sensitive data exposure
Why sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.
SQL injection and XSS: what white hat hackers know about trusting user input
A primer on SQL injection and cross site scripting, and how to handle user input in software development.
How to set up OpenVPN on AWS EC2 and fix DNS leaks on Ubuntu 18.04 LTS
A guide for setting up your own private VPN service, and understanding and fixing a DNS leak.