Category: news

Rootkits & Memory Forensics: Can They Hide?

TL;DR Yes, rootkits can hide processes from memory forensics tools like Volatility, but it’s not a […]

Rootkits & Kernel Process Memory Modification

TL;DR Yes, a rootkit can potentially write to the virtual memory of a kernel process and […]

Rootkits After Formatting: Beyond MBR & BIOS

TL;DR Yes, rootkits can survive a standard format of the hard drive. They can hide in […]

Rooted Android vs Windows Security

TL;DR A rooted Android device can be more risky than a typical Windows desktop for banking, […]

CAS Authorization: A Practical Guide

TL;DR Yes, Central Authentication Service (CAS) can handle authorization, but it’s not its primary function. CAS […]

Captive Portal Setup

TL;DR This guide shows you how to set up a captive portal – a webpage users […]

CA Trust: Risks & Checks

TL;DR Certificate Authorities (CAs) are essential for secure websites, but they aren’t perfect. Mistakes happen, and […]

CA Signing Other CAs: Is it Possible?

TL;DR Generally, a Certification Authority (CA) shouldn’t directly sign another CA’s certificate. It creates trust issues […]

CA Signing vs Certificate Public Key

TL;DR A CA (Certificate Authority) uses a signing algorithm to create digital signatures for certificates, verifying […]

CA Signed Certificate: Localhost & App

TL;DR This guide shows you how to create a CA-signed certificate for your localhost development environment […]