2Ghost Calls: Abusing Web Conferencing for Covert Command and Control (opens in new tab)(praetorian.com)9justinludwig7mo ago0
5Wayland Apps in WireGuard Docker Containers (opens in new tab)(procustodibus.com)49justinludwig1y ago10
9Connection Tracking (Conntrack): Design and Implementation Inside Linux Kernel (opens in new tab)(arthurchiao.art)15justinludwig2y ago0
10Containers: Rootful, Rootless, Privileged and Super Privileged (opens in new tab)(infosecadalid.com)2justinludwig2y ago0
13Interviews in the Age of AI: Ditch Leetcode – Try Code Reviews Instead (opens in new tab)(chrlschn.dev)1justinludwig2y ago0
14Elixir/Erlang Secure Coding and Deployment Hardening Guidelines (opens in new tab)(erlef.github.io)195justinludwig2y ago3