OAuth 2.x and OpenID Connect sequence diagrams
Published:
Some sequence diagrams about OAuth 2.x and OpenID Connect.
Published:
Some sequence diagrams about OAuth 2.x and OpenID Connect.
Published:
Some commands for interacting with the namespaces of Podman containers.
Published:
Some notes about using Podman instead of Docker, on Linux. This has been tested on Podman v3.4.7.
Published:
Executing the Stable Diffusion text-to-image model on an AMD Ryzen 5 5600G integrated GPU (iGPU).
Published:
How to extract the schema from a remote LDAP server and use it on a OpenLDAP instance.
Published:
Comparing the different Wifi/WPA authentication and key distribution methods (PSK, EAP, SEA).
Published:
Some context and analysis about attacks on in WebDriver implementations.
Published:
Lack of X.509 TLS certificate validation in OWASP ZAP (Zed Attack Proxy) could be used for man-in-the-middle attacks.
Published:
A DNS rebinding vulnerability I found in ReadyMedia (formerly MiniDLNA) v1.3.0 and below. This is CVE-2022-26505.
Published:
Some notes about how TLS v1.3 works. This is a follow-up of the previous episode about TLS v1.2. As before, the goal is to have a high-level overview about how the protocol works, what is the role of the different messages and be able to understand (and debug) a network traffic dump.
Page 2 of 10 | Previous page | Next page | JSON Feed | Atom Feed