programming

Python Logging Cheatsheet

Cheatsheet of how to use python's built in logging

Read
infosec

Exfiltrating Past CSP Directives

An example of using Google Analytics to exfiltrate past CSP directives on HackerOne

Read
infosec

Revoking a PGP Key from MIT's Key Server

Instructions on how to revoke your public PGP key from MIT's Key Server.

Read
linux

Yubikey OpenPGP Setup for SSH and Commit Signing

Some disorganized notes on how I set up my yubikey for SSH auth and git commit signing.

Read
linux

Setting up RAID1 with mdadm

How I setup RAID1 on a basic USB sata docking station.

Read
linux

Setting up Thinkpad dockd

I finally bought myself a dock for the thinkpad I use as my main computer. After using the new dock for some time I noticed that the screen would be stuck displaying black after leaving the system locked for a longer time. Looking around I found dockd which fixes that problem and automates the switching of display layouts.

Read
linux

Setting up Brother DS620 on Linux

I got myself a scanner so that I could scan some paperwork. Payslips, tax declarations. I went for the Brother DS620 because of it's small size and the fact that it had linux drivers available. Here's how I set it up on Ubuntu and a small cheatsheet for the future.

Read