• The Clarity That Comes from Resting in Awareness

    January 17, 2026

    When we rest in awareness, we see our struggles more clearly—and realize they’re temporary, not permanent. The discomfort of uncertainty, the weight of past fears, the challenge of difficult decisions: all passing moments that teach us about our own resilience. You’ve already survived everything that brought you to this moment. That proven strength becomes your…

  • Apple Pay and TLS Decryption

    March 2, 2025

    The process of troubleshooting Apple Pay with TLS decryption can be frustrating due to a lack of useful error messages. This post describes the steps involved to troubleshoot and identifies what hostname needs to be excluded from TLS decryption.

  • Exploring the Syrup Shroud Project: Mapping IPs to BGP ASNs Made Easy

    December 2, 2024

    The Syrup Shroud Project is a Python tool designed for system administrators, network engineers, and cybersecurity professionals to map public IP addresses to their BGP Autonomous System Numbers (ASNs). Utilizing the RIPE API, Syrup Shroud simplifies WHOIS lookups, producing organized results suitable for analysis and automated workflows.

  • Connecting Through Rhetoric: Mastering Ethos, Pathos, and Logos in Everyday Communication

    September 13, 2024

    In daily interactions, persuasion plays a crucial role. Aristotle’s ethos, pathos, and logos offer timeless principles for effective communication. Ethos builds trust, pathos appeals to emotions, and logos employs reason. Balancing these elements involves adapting to the audience and using transitional phrases. Mastering these skills enhances relationships and resolves conflicts without manipulation.

  • Blocking Hosting Providers

    September 12, 2024

    The challenge of making online content accessible is compounded by the constant threat-actor access. These actors often utilize hosting providers to carry out their activities. To address this, the Molasses-Masses project generates daily updated lists of hosting provider subnets, aiding in the creation of effective security policies. The project is based on observed attacks and…

Next Page→

Personal Blog

Personal blog of myself and what I do.

Home About Cybersecurity Links and Tools

🔒 Cybersecurity 🔐 PKI 🍲 Foodie 💰Cryptocurrency 🐳 Docker 👨‍💻 Programming 🧠 Personal 📸 Photography

  • Subscribe Subscribed
    • Personal Blog
    • Already have a WordPress.com account? Log in now.
    • Personal Blog
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar