For a variety of reasons, device and software manufacturers implement various levels of restrictions to prevent users from accessing saved WiFi keys. On Android (depending on your device model/software) you may be able to access the key for an individual access point, or share this information via a QR code. This data may even be included when using Google to backup/restore your Android device…
Latest posts
Docker is not inherently secure by default, especially since the daemon-container architecture runs as root by default. There are many ways you can significantly limit the consequences of an attack should one compromise your system via your services/containers. This post served as my guide when getting started with self-hosting. This list is in no way comprehensive, so let me know in the comments…
Introduction to VirtualBox VirtualBox is a widely used virtualization software that was acquired by Oracle in 2010. It enables users to create and run software-based emulations of a physical computer system (virtual machines) on their computers. This allows users to run multiple operating systems simultaneously without the need for separate physical hardware. Whether you're a developer or simply…
To increase security you should be using rootless Docker where you can. As written by Jake Howard: Docker containers, and containers as a whole, are really just a regular program wrapped in some extra protections provided by the kernel (namely cgroups etc) to create isolation, and other interesting features. Unlike VMs, containers run closer to the host operating system, so close they use the same…