Defensive and awareness-focused cybersecurity content. Practical, responsible, and useful.
2 articles
The six changes that move a home lab from exposed to defensible: SSH keys, fail2ban, firewall defaults, unattended upgrades, Tailscale, and backups. Step by step.
Most CVE alerts in your dependency tree are not actually exploitable in your app. A calm, repeatable process for triaging npm audit and Dependabot output.