Posts Tagged ‘Security Tools And Technology’
How To Encrypt Gmail Emails Using Mailvelope
Over the past couple of years we’ve been reminded time and time again of how susceptible our communication mediums are to prying eyes. Classic examples of its susceptibility can be seen in the very public disclosure of General Petraeus affair in 2012, the release of over 170,000 emails after the Sony compromise in 2014, to the…
Read MoreWebsite Security is Not an Absolute
I work in the field of Information Security (InfoSec), specifically website security. With that in mind, it’s but one very small piece of a very large pie. Security is complex, even at the 50,000 foot level; within each specific area of the industry, it can get even more complex. It’s no wonder it can feel…
Read MoreUpdating Permalinks in Ghost
When I think about blogging, there is perhaps no more important feature or concern than impacts to SEO. It’s perhaps one of the biggest concerns many will likely experience when performing a migration to the Ghost blogging platform. I recently migrated my personal blogs to this platform and share some insights into the installation process…
Read MoreInstall Ghost .5 on CentOS 7 w/NGINX
I recently wrote of the migration from WordPress to Ghost. In this post I want to share with you the installation workflow I used. I plan to go cradle to grave through the process. I’ve tested it a number times, and it works every time, so even if you’re a novice you should be able…
Read MoreGhost: Blogging For The Future
It’s only been recently that I have come to the realization that I fit into the blogger category. In doing so, I have started to place more emphasis on the technologies I’m employing to get my work done. Ghost: Just a Blogging Platform For the better part of 5 years I have been an adamant…
Read MoreHow Hosts Manage Your Website Security
Hosts are concerned with the security of their infrastructure, not with your website. This is a distinction that most website owners fail to make, and it’s made more evident to me every day. This same misunderstanding however puts hosts in a precarious situation where clients expect security, and to some extent get it, but on…
Read More