Competitor research is a vital part of SEO (Search Engine Optimization) as it allows you to understand the strategies and tactics your competitors are using to achieve success in the
Continue reading
Payment tech: Building Mobile vs Web wallet
Being an ex. founder of a multi-signature Bitcoin mobile wallet both for Android and IOS (at Kesem.io) and a web developer in the past, I decided to summarize what are
Continue reading
Hack to set up SSL certificate in AWS Marketplace CloudFormation template
This method can be used to deploy a standard (not a self-signed) certificate for your product web management or for your API service deployed using CloudFormation template.
Continue reading
Privacy Wild West is over, deploy Databunker
Today, I would like to announce the availability of the project I was working in my spare time. It is a one-stop-shop solution for any startup that wishes to comply
Continue reading
Backdoor webserver using MySQL SQL Injection
MySQL Database is a great product used by thousands of websites. Various web applications use MySQL as their default database. Some of these applications are written with security in mind,
Continue reading
Harvesting LinkedIn data for fun & profit
A few years ago, before the GDPR era, I was involved in a stealth marketing startup. We went out of business without getting funding. During my work on the start-up,
Continue reading
Codeseek.com – search engine for developers
I used to be a software developer in the past. Sometimes, even today, doing mostly cloud security, I need to dig deeper into the code. Most of the time I
Continue reading
Fix curl SSL certificate problem
When using curl, from PHP, from time to time, I had to use some 3rd party API services. Today I would like to deep dive into common error when trying
Continue reading
OWASP Global AppSec DC 2019
Hello. For all my US readers, I have great news for you. In case you are going to attend OWASP Global AppSec DC September 12-13 in Washington, DC, it is
Continue reading
Step by step Hashicorp Vault CA/PKI deployment
I love to work with Hashicorp Vault in the cloud projects. It is a great solution for companies that do not want to lock themselves to Google or AWS cloud.
Continue reading
Secure Docker networking in AWS/AZURE
Today I had to add another security brick to the project I am working on – limit access from Docker containers to sensitive resources: block access to AWS and Azure
Continue reading
Stellar coin – calculate size of buckets/ directory
Stellar digital currency fascinates me a lot. I do not consider it as a true blockchain as Bitcoins, but more as a distributed database for transactions. I think it is
Continue reading
How to do AssumeRole in Azure
Today I would like to give you a solution that will allow you to control one Azure account from another. Let’s start from the basics. AWS AssumeRole is used for
Continue reading
Cloud security checklist
Here is a partial list of security activities to perform to raise your project security level. 1. Basic container – use a very simple base container with a minimal number
Continue reading
Stop selling me developer hours, sell me results
Start selling me results. I am not going to Ukraine or Belarus or Romania or Russia to manage developers locally. I am ready to buy results only. As a CTO
Continue reading
Copy app binary file using adb shell
Sometimes it is very useful to copy binary file from Android back to host OS. For example you can copy application database. I used the following method to copy binary
Continue reading
Adding custom data to bitcoin transaction
As you probably know, most of the people talk about Bitcoin blockchain as to distributed ledger, meaning it is a distributed database of transactions. The are some ways that allow
Continue reading
Modern approach to monolithic software design
I used to like monolithic software design. I build code that was using in-memory databases and can sustain pretty heavy load. In one project that I was a R&D manager
Continue reading
Hello World from #NET docker container in Linux
As developers are moving to containerize software deployment mostly running on Linux servers, Microsoft does not want to stand behind. Microsoft has officially released docker containers to run asp.net and
Continue reading
Checkpoint R80.10: dump firewall rules from remote
One of the core concepts of computer and network security is multi-layer security protection. In simple words it means, to be safe, you need to add more protection layers. A
Continue reading