#information security
all tags
Virtual Safe Box
Running the operating system on an encrypted disk only protects my data when the computer is at rest, but what happens while I am using the system? Why all my essential documents should always be available?
3 minutes
Read more 
Mullvad OpenVPN Gateway
I am building a cybersecurity home lab. However, I do not like my ISP having all logs of my home lab activity. I do not know why but this feels threatening even if I am not planning to be a black hat.
2 minutes
Read more 
The CIA triad in Information Security
In the vast and complex world of cybersecurity, these three terms help people communicate better using common and more conventional terminology.
4 minutes
Read more