- Victoria Drake
How users and applications stay safe on the Internet: it's proxy servers all the way down
An overview of how proxy servers form the basis of online anonymity, and how their use in various forms helps both users and web applications.
cybersecurity
9 min read
- Victoria Drake
Hackers are Googling your plain text passwords: preventing sensitive data exposure
Why sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.
cybersecurity
8 min read
- Victoria Drake
SQL injection and XSS: what white hat hackers know about trusting user input
A primer on SQL injection and cross site scripting, and how to handle user input in software development.
cybersecurity
11 min read
- Victoria Drake
How to set up OpenVPN on AWS EC2 and fix DNS leaks on Ubuntu 18.04 LTS
A guide for setting up your own private VPN service, and understanding and fixing a DNS leak.
aws
14 min read