Posts
2023
Goodbye Ghost, Hello Hugo
·6 mins
Ixonae
System Administration
My First CVE, and the Dangers of Over-Logging
·4 mins
Ixonae
Security
Research
Reverse Engineering
Vulnerabilities
Aircraft-Related OSINT: A Simple Guide
·6 mins
Ixonae
OSINT
2022
Home Network and pfSense Configuration Improvements
·6 mins
Ixonae
Networking
System Administration
The 32 Best Books I Have Read in 2022
·7 mins
Ixonae
Reading Notes
How To Protect Your Self-Hosted Services Behind WireGuard
·7 mins
Ixonae
System Administration
Security
Networking
Why I (Partially) Self-Host My Emails And Don't Use E2E Email Providers
·7 mins
Ixonae
System Administration
Privacy
VPN and DNS Leaks - What Are Their Consequences and How to Detect Them
·5 mins
Ixonae
Networking
Security
How to Use Postfix to Send Emails Through Amazon SES
·6 mins
Ixonae
System Administration
Setup HTTP Basic Authentication with your Spring Boot API
·5 mins
Ixonae
Programming
Security
2FA: You're Doing it Wrong
·9 mins
Ixonae
Security
BGP: What Is It And How Does It Work
·12 mins
Ixonae
Networking
Security
Protect Your Home Network With pfSense - A Simple Walk-Through
·14 mins
Ixonae
Networking
Privacy
System Administration
Configure a Raspberry Pi as a Secure WiFi Access Point with OpenWrt
·6 mins
Ixonae
Networking
Security
System Administration
Privacy
Online Accounts Hygiene and Management
·7 mins
Ixonae
Privacy
2021
Cell Towers: How They Can Be Used to Track Your Movements (Now and in the Past)
·14 mins
Ixonae
Privacy
Forensics
Taproot Soft-Fork: What Does it Bring to Bitcoin?
·6 mins
Ixonae
Crypto Currencies
Getting Started with NASM Assembly
·14 mins
Ixonae
Programming
Reverse Engineering
Image Forensics and OSINT: Getting Intelligence from Pictures
·8 mins
Ixonae
Privacy
Forensics
OSINT
Reading Notes: Cybersecurity Career Master Plan: Techniques and tips to advance in your cybersecurity career
·10 mins
Ixonae
Reading Notes