Recently, I've been doing a lot of penetration test reports. It's given me lots more insight on forming a better report, my initial reports were subpar at-best now that I've done dozens of them. I thought I'd make this post and share some tricks I've learned along the way, and things to avoid.

At 9:30 PM last week, my infrastructure received a denial of service attack. The infrastructure hosts this blog, my wifes blog, my wifes eCommerce store and some work-in-progress projects that I'm preparing to release. In addition, it also hosts a VPN for when I'm on the go, a few staging environments, my media

Is there such thing as privacy in any modern digital society? In recent years, privacy has been a very hot topic. With the Snowden leaks and continuous reports of violations across the world, there’s a strong case against privacy in a digital age. I’d argue that you should have no expectation of privacy in

I’ve been a long time user of Debian to run my stack, and it’s been pretty resilient on my small websites. Alas, as my websites grow in traffic I wanted something to provide more security and isolation, while offering individual limitations for non-priority resources. I first spotted Cloudlinux when researching shared hosting isolation, and