IAAS, PAAS, SAAS, On-Prem. Let’s explain these with the brand new Pizza as a ServiceThe Cloud is a great tool that allows you to scale up very quickly. But it can be complicated to understand the differences among…Apr 15, 2021Apr 15, 2021
How long to crack that password ?Password is your best lines of defense against attackers, but they can crack it from you very, very quickly. Let’s see how long it takesMar 30, 2021Mar 30, 2021
Is this the future of the Yubikey ?I feel like I have found the future of Yubikey. 🗝 ➡️ 🔑 Let’s talk about this in this video.Mar 24, 2021Mar 24, 2021
9 Key Points about PasswordsPasswords, the Holy Grail of computer security. Everyone wants to get rid of it. But we’re still forced to use it. Here are 9 key pointsMar 15, 2021Mar 15, 2021
The 14 Financial Impacts of a Cyber Attack 💸The financial cost of a cyberattack goes beyond identifying and resolving the attack. There are a lot of additional costs. Let’s detail…Mar 10, 2021Mar 10, 2021
How much for my personal data on the Dark Web ?We are hearing about more attacks targeting hospitals daily. But why ? Because of these data’s price on the Dark Web. Let’s figure this…Mar 1, 2021Mar 1, 2021
Bandit CTF — 6 to 10 Challenges Writeup — OverTheWireA CTF is the perfect place to learn security skills. Here, I am going through the challenges 6 to 10 of the overthewire Bandit CTF.Feb 24, 2021Feb 24, 2021
Bandit CTF — 1 to 5 Challenges WalkthroughKnowing where to start when I’m interested in offensive computer security can be tricky. CTF is the perfect sandbox. Let’s do it together.Feb 15, 2021Feb 15, 2021
Should I Train on CTF or Bug Bounty ?Computer security is of interest to you, but you don’t know where to start. Is it CTFs or Bug Bounties TFeb 1, 2021Feb 1, 2021
WhatsApp Done. What about the Other Ones !!! — CryptomatorWhatsApp is Out. But is there any other data hungry apps out there that we should take care about ?Jan 25, 2021Jan 25, 2021
WhatsApp or Signal — Make an Informed ChoiceSignal has seen incredible adoption in recent days, mainly due to a change in the WhatsApp T&Cs that scares many people.Jan 18, 2021Jan 18, 2021
Security by Design — Everything you need to knowSecurity by Design is a method that will allow your team to take security into account from the start of a project. It has 8 main stepsJan 11, 2021Jan 11, 2021
Mobile Password Management, the good wayHow to have all of your passwords on all of your machines, always up to date, for free.Dec 28, 2020Dec 28, 2020
This is the Ultimate YubikeyCombining U2F and Biometrics is pushing the personnal security pretty high. Let’s talk about it.Dec 27, 2020Dec 27, 2020
My Thoughts about the Github Universe 2020Netflix got incredibly good movies but I found something much more interesting today. 🤟🏼 Github Universe !!! 🤟🏼Dec 14, 2020Dec 14, 2020
How to Connect an Android Phone to a Docker Container ?So, You decided to develop in Docker containers but can’t use ADB to connect to your phone. I’ll explain everything.Dec 7, 2020Dec 7, 2020
Review of some of the main Data Breaches of October and November and Lessons learned from themIn this video I’m reviewing a lot of these breaches that have occurred in recent weeks. This helps us understand the popular…Nov 30, 2020Nov 30, 2020
Debug your Go app in a Docker ContainerAre you Developping in a Docker Container, and you Chose Go as your Development Language ? Did you struggle to do it ? Struggle no more.Nov 23, 2020Nov 23, 2020
How to Use GPG to Sign your Commits on Github, Gitlab, BitbucketOn Git, everyone can impersonate your commits. That’s why you have to sign your commits. I’ll show you how to set up everything here.Jul 17, 2019Jul 17, 2019
How to Setup Multiple Ssh Keys for Multiple Github/Bitbucket accountsYou have multiple identities (personnal, professional, etc) and you want to have a specific ssh key for everyone of them. Follow these stepsJul 15, 2019Jul 15, 2019