1"Neurokink; or, the time that I turned a board game into a sex toy" (opens in new tab)(neurokink.com)1daveio12y ago0
2Your integrity checking hash shouldn't be the one you use for password storage. (opens in new tab)(blog.dave.io)1daveio12y ago0
4A clear guide to firewalling, for the paranoid and broke (opens in new tab)(geekosaur.com)2daveio15y ago0
5Geekosaur guide to not sucking at cryptography, part 2: Making A Hash Of It (opens in new tab)(geekosaur.com)2daveio15y ago0
6Sniffers, Tunnels, and Puppets: How a VPN can improve your online life (opens in new tab)(geekosaur.com)4daveio15y ago0
7The Apple iPad for Sysadmins: getting your job done and having a bit of fun too (opens in new tab)(geekosaur.com)2daveio15y ago0
85 top Android and iOS tools for the mobile systems administrator (opens in new tab)(blog.ultraspeed.com)3daveio15y ago0
9Cryptography: why modes matter, and why 'encrypted' is not always 'unreadable' (opens in new tab)(geekosaur.com)3daveio15y ago2