Security
Hackers are Googling your plain text passwords: preventing sensitive data exposure
Why sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.
SQL injection and XSS: what white hat hackers know about trusting user input
A primer on SQL injection and cross site scripting, and how to handle user input in software development.
How to set up OpenVPN on AWS EC2 and fix DNS leaks on Ubuntu 18.04 LTS
A guide for setting up your own private VPN service, and understanding and fixing a DNS leak.