Most systems do not hold user passwords in clear text. Best practices for password storage is passing it through a hash function that creates a…
Michael Rinderle Posts
Lately I had just moved a Universal Windows Platform app running on .NET Core to another workstation to continue developing a client’s application. Unfortunately, when…
If you didn’t notice, by default Window’s search feature from the start menu leaks your data. Each and every time you type a search from…
For most of us the name Phil Zimmermann doesn’t ring a bell. But it was his software and legal battles stemming from creating it that…
In December 1945, the Germans were launching their last major offensive attack known as the Ardennes Counteroffensive. This offensive covered the Ardennes region of Belgium,…
If you think parental controls are dead, think again. Today I will provide you with a way to protect your family by configuring your device’s…
When an attacker has gained access to a private network the next goal is to look around the network to see what is on it.…
Ever since the first version of the Windows Subsystem For Linux (WSL), people have been seeing major benefits of the feature in the Windows ecosystem.…
Can you scan the entire internet with over 8 billion devices connected to it? In the event of a newly found major security bug, researchers…
Some projects require tunneling through a proxy system to connect to, monitor or probe a specific resource. If you are programming with Python sockets you…