Security
Secure Malware Analysis …
As a system administrator dealing with security incidents, you’ll inevitably encounter situations where you need to analyze suspicious files. Running malware on your production systems? Absolutely not. That’s where Docker comes in—providing isolated, disposable environments for safe …
Hardening Linux Servers: …
When setting up a new Linux server—whether it’s a web server, database, or application host—security hardening is non-negotiable. This guide covers the essential steps I follow when preparing any production Linux server. Initial Setup Create a Non-Root Admin User Never use root for daily …
Two Captcha Bypasses — …
This is my first write-up here. I will talk about how I bypassed captcha on two companies. First One (Captcha Token Reuse) While testing a site.example.com, I found that signing up on their site had a captcha. I solved the captcha challenge and captured the request with credentials, and I saw the …


