Being an ex. founder of a multi-signature bitcoin mobile wallet both for Android and IOS (at Kesem.io) and a web developer in the past, I decided to summarize what are
Continue reading
Paranoid Security for Cloud, Mobile and Blockchain
Being an ex. founder of a multi-signature bitcoin mobile wallet both for Android and IOS (at Kesem.io) and a web developer in the past, I decided to summarize what are
Continue readingThis method can be used to deploy a standard (not a self-signed) certificate for your product web management or for your API service deployed using CloudFormation template.
Continue readingToday, I would like to announce the availability of the project I was working in my spare time. It is a one-stop-shop solution for any startup that wishes to comply
Continue readingMySQL Database is a great product used by thousands of websites. Various web applications use MySQL as their default database. Some of these applications are written with security in mind,
Continue readingA few years ago, before the GDPR era, I was involved in a stealth marketing startup. We went out of business without getting funding. During my work on the start-up,
Continue readingI used to be a software developer in the past. Sometimes, even today, doing mostly cloud security, I need to dig deeper into the code. Most of the time I
Continue readingWhen using curl, from PHP, from time to time, I had to use some 3rd party API services. Today I would like to deep dive into common error when trying
Continue readingHello. For all my US readers, I have great news for you. In case you are going to attend OWASP Global AppSec DC September 12-13 in Washington, DC, it is
Continue readingI love to work with Hashicorp Vault in the cloud projects. It is a great solution for companies that do not want to lock themselves to Google or AWS cloud.
Continue readingToday I had to add another security brick to the project I am working on – limit access from Docker containers to sensitive resources: block access to AWS and Azure
Continue readingStellar digital currency fascinates me a lot. I do not consider it as a true blockchain as Bitcoins, but more as a distributed database for transactions. I think it is
Continue readingToday I would like to give you a solution that will allow you to control one Azure account from another. Let’s start from the basics. AWS AssumeRole is used for
Continue readingHere is a partial list of security activities to perform to raise your project security level. 1. Basic container – use a very simple base container with a minimal number
Continue readingStart selling me results. I am not going to Ukraine or Belarus or Romania or Russia to manage developers locally. I am ready to buy results only. As a CTO
Continue readingSometimes it is very useful to copy binary file from Android back to host OS. For example you can copy application database. I used the following method to copy binary
Continue readingAs you probably know, most of the people talk about Bitcoin blockchain as to distributed ledger, meaning it is a distributed database of transactions. The are some ways that allow
Continue readingI used to like monolithic software design. I build code that was using in-memory databases and can sustain pretty heavy load. In one project that I was a R&D manager
Continue readingAs developers are moving to containerize software deployment mostly running on Linux servers, Microsoft does not want to stand behind. Microsoft has officially released docker containers to run asp.net and
Continue readingOne of the core concepts of computer and network security is multi-layer security protection. In simple words it means, to be safe, you need to add more protection layers. A
Continue readingMSI is a format used for application installation in Windows. Today I had to extract exe file from MSI file and I found a very simple way to do it
Continue reading