Posts

  • Log Pattern Recognition: Drain

    This is my second article about Log Pattern Recognition. In this series, we explore different approaches to automated pattern recognition.

  • Log Pattern Recognition: LogMine

    When retrieving logs from an application, you are often looking for outliers (such as a unique error) or what pattern occurs the most. However, defining patterns manually is time-consuming and requires rigour across projects. In this series of blog posts, we are going to explore automated Log Pattern Recognition.

  • DSA-2020-209: Dell XPS 13 9370 Improper Exception Handling vulnerability

    In August 2019, I’ve discovered a bug in how the XPS Bios handles a bootable device. This bug allows an attacker with write permission to a bootable device or physical access to the computer to prevent it from booting.

  • AudioContext Fingerprinting

    An introduction to AudioContext, and how to protect your browser from being fingerprinted by using the AudioContext Scrambler add-on.

  • CNAME Uncloaking using dnscrypt-proxy

    Advertisers are starting to encourage users to use CNAME to masquerade third-party trackers as first-party. Browser extensions do not get access to the DNS answer and are therefore unable to correctly block these trackers. It makes sense to find another way to block these trackers.

  • Getting back some privacy when using DNS

    An introduction to DNS, DNSCrypt and DNS Over HTTPS. The purpose of this article is not to explain in depth how DNS works, if you want to learn more about DNS, please check the references given in the article. I am only showing an application of what you can do with dnscrypt-proxy.

subscribe via RSS