Reversing Sound Blaster X7 Control for fun and Linux support
My personal setup uses a single DAC to handle Bluetooth, USB and optical inputs. Unfortunately, controlling the DAC through Bluetooth is only supported on mobile. Let’s fix that.
Log Pattern Recognition: Drain
This is my second article about Log Pattern Recognition. In this series, we explore different approaches to automated pattern recognition.
Log Pattern Recognition: LogMine
When retrieving logs from an application, you are often looking for outliers (such as a unique error) or what pattern occurs the most. However, defining patterns manually is time-consuming and requires rigour across projects. In this series of blog posts, we are going to explore automated Log Pattern Recognition.
DSA-2020-209: Dell XPS 13 9370 Improper Exception Handling vulnerability
In August 2019, I’ve discovered a bug in how the XPS Bios handles a bootable device. This bug allows an attacker with write permission to a bootable device or physical access to the computer to prevent it from booting.
An introduction to AudioContext, and how to protect your browser from being fingerprinted by using the AudioContext Scrambler add-on.
CNAME Uncloaking using dnscrypt-proxy
Advertisers are starting to encourage users to use CNAME to masquerade third-party trackers as first-party. Browser extensions do not get access to the DNS answer and are therefore unable to correctly block these trackers. It makes sense to find another way to block these trackers.
Getting back some privacy when using DNS
An introduction to DNS, DNSCrypt and DNS Over HTTPS. The purpose of this article is not to explain in depth how DNS works, if you want to learn more about DNS, please check the references given in the article. I am only showing an application of what you can do with dnscrypt-proxy.
subscribe via RSS