Rootkits & Memory Forensics: Can They Hide?
TL;DR Yes, rootkits can hide processes from memory forensics tools like Volatility, but it’s not a […]
Rootkits & Kernel Process Memory Modification
TL;DR Yes, a rootkit can potentially write to the virtual memory of a kernel process and […]
Rootkits After Formatting: Beyond MBR & BIOS
TL;DR Yes, rootkits can survive a standard format of the hard drive. They can hide in […]
Rooted Android vs Windows Security
TL;DR A rooted Android device can be more risky than a typical Windows desktop for banking, […]
CAS Authorization: A Practical Guide
TL;DR Yes, Central Authentication Service (CAS) can handle authorization, but it’s not its primary function. CAS […]
Captive Portal Setup
TL;DR This guide shows you how to set up a captive portal – a webpage users […]
CA Trust: Risks & Checks
TL;DR Certificate Authorities (CAs) are essential for secure websites, but they aren’t perfect. Mistakes happen, and […]
CA Signing Other CAs: Is it Possible?
TL;DR Generally, a Certification Authority (CA) shouldn’t directly sign another CA’s certificate. It creates trust issues […]
CA Signing vs Certificate Public Key
TL;DR A CA (Certificate Authority) uses a signing algorithm to create digital signatures for certificates, verifying […]
CA Signed Certificate: Localhost & App
TL;DR This guide shows you how to create a CA-signed certificate for your localhost development environment […]