I was featured in one of the MongoDB podcast series where we discussed how I got the idea of building ybits.io. Further we discussed about Mongodb GridFS and many other features. I hope you’ll enjoy the conversation. Reach out for any feedback/questions/comments: https://open.spotify.com/episode/3d6GcNm92NKOE5ebTgRLhr
Over the past couple of weeks I took some time to research for a feasible cryptographic primitive protocol that can be used in YBITS.IO, a secure, simplefied, ananonymous large file tranfer service. Below is compilation of some blog posts and research papers I found to be useful that may also help you on your next project. For a more valuable, in depth resources check out the IACR database https://eprint.iacr.org/ RFC & Scientific papers EME Encryption https://eprint.
DISCLAIMER: all external links provided in this article have no affiliation to promotion either directly or indirectly. Life is worthwile if you share. Jim Rohn If you’re new to security governance, SaaS companies seek to publicly prove that their business model and service offerings that the data processed on behalf of the customer (or user) is processed with integrity, high trust of security, confidentiality. To do so, they will request an external firm to conduct an audit of the entire business to validate that it aligns with industry and or governance standards.
A guest post I wrote on MongoDB developer blog. I hope you’ll enjoy it. Quickstart Golang-Mongodb: A Quick Look at Gridfs
In December 2019 I published an article which elaborates a little of what I’ll focus on in 2019. I had not taken the courage to write often, but I am glad to get back to it. This quarter, the focus was on servicing and giving back as shared. As part of contributing and giving back to community, I joined the NYC Mesh community network and dished out the tradition ISP because, why not.
On June 14th & 15th, 2019 couple CTF enthusiast participated to solve the Red Balloon Security CTF challenge at SummerCON announced here. For those who aren’t familiar with SummerCON, it’s a small 2-day hackers' conference organized and led by volunteers in New York City. Think of its culture similar to DEFCON. To kick off the game, each player collects two ATM card: a debit and a credit card. The tasks are to find the flag to load money into the issued ATM cards.
Note: post originally published on Januray 4th, 2019 2018 was a year of observations and lots of trials, but more importantly a year of freedom The year two thousand and eighteen was one of those years where I risked it all. I’ve never written a year review as I’ve never seen the need for it. This year, I was compelled by the love and gratitude of how much has happened is miserable.
When buying a TLS/SSL certificate from a CA, mainly a user supplies a csr file. The easiest way is using the OpenSSL CLI. But the tricky part lies in generating a SAN CSR. Although users can scope it in one liner, better to not mess with system config. Therefore the following method mitigates that. Copy this code block, and save it as san.conf or anything of preference (change parameters accordingly):
DISCLAIMER: All views expressed on this site are my own and do not represent the opinions of any entity whatsoever with which I have been, am now, or will be affiliated. THIS POST HAS NO AFFILIATION TO ANY ADVERTISEMENT. Finaly this blog is live and happy to have completed the project. I will try to keep this short and precise. Previously, all my creative contents were published on Medium, however, the choice to move off of Medium was mainly to have some flexibility as well as put my technical skills into some challenges.