Skip to content
  • About
  • Blog

Category: Cyber Security

ufw-docker

How to use UFW firewall with Docker containers?

18 March، 202318 March، 2023 oussamaComments are off for this post.

Motivation You are using uncomplicated firewall (ufw) and you realised that your docker web app is accessible via the internet regardless of the status of ufw, then this article is for you. I try here to answer two questions: Why does not ufw work for Docker containers? The answer is very simple, both ufw and […]

Read More…
Open Book and Sparkles

“The Phoenix Project” – Book review and afterthoughts

21 January، 202310 February، 2023 oussamaComments are off for this post.

Several months ago, I finished reading “The Phoenix Project” by Gene Kim, George Spafford, and Kevin Behr. The book tell the story of an IT operation engineer, Bill Palmer, who get a sudden promotion and have to deal with all sorts of complications and difficulties while being under immense stress during a pivotal moment in […]

Read More…
KeePassXC-Logo

Dumping unique passwords from a KeePass file

19 December، 202013 March، 2021 oussamaComments are off for this post.

Recently, I was asked by a customer to help recovering a password of a VeraCrypt encrypted volume they lost access to. I did not wanted to fire a password cracking software like JohnTheRipper or HashCat with brute force attack because that should always be the last resort. The recommended approach for this particular case is […]

Read More…
  • About
  • Blog
  • Impressum
  • Privacy

Decode Theme by Macho Themes

Navigation

  • About
  • Blog

Categories

  • Announcement (1)
  • Art (1)
  • Blog (21)
  • Cyber Security (3)
  • DevSecOps (8)
  • HowTo (15)
  • Open Source (10)
  • Opinion (2)
  • Point of View (3)
  • Python (5)


Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}