Blog

Message Integrity

Methods to protect message integrity online

KubeCon Day 1

My first visit to a academic conference

KubeCon Day2

My first visit to a academic conference

Control Hijacking

Hijack a built computer program

Access Control And Isolation

How to construct a system with access control

How to properly mount Google Drive with RClone

Mount Google Drive with security and cache