Articles

Small but Deadly  

The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look at potential applications in pentesting scenarios.

Behind the Mask  

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.

Doing Without  

Use advanced techniques for automation, optimization, and security to deploy serverless applications with the OpenFaaS framework in a Linux environment.

Eruption  

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.

Light at the End of the Tunnel  

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.