May 11, 2022

In the last few years, I started to work (pro bono) on a different topic: personal digital security. In this post, I want to discuss post-mortem security: how to minimize family threats after death.

Post cover
January 04, 2021

As human beings, due to our evolutionary background, we struggle to perceive the dangers of the digital world. We have always been accustomed to assessing risk based on our physical environment, evaluating the context (location, people, etc.

Post cover
August 07, 2020

On my home Linux box, I implemented Let’s Encrypt to properly manage secure HTTPs connections. To properly configure it we need to: Make the directory /.well-known reachable via HTTP and mapped locally under /var/www/html/.

Post cover
September 19, 2018

Git repositories are very interesting from an OSInt perspective. There are a few commands to find out deleted files and recover them in seconds: # Find deleted files git log --diff-filter D --pretty="format:" --name-only | sed '/^$/d' > deleted_files.

Post cover
March 29, 2017

Every time I need to work with Linux SNMP utilities, I have to re-learn some commands. This post summarizes useful SNMP commands for anyone who needs a reference guide. Common options Usually, I need to build a custom and trusted MIB repository.

Post cover