Tech Couch

A Comfy Corner for Software, Security, Cloud, and AI

Introduction to ZeroMQ networking patterns

Networking software simplified

Finding common bugs with valgrind

From memory leaks to race conditions

How attackers hide backdoors in web servers

Understand and detect post-exploitation changes

Production-ready wordpress hosting on docker

Complete with SSL certificates, backups and upgrades

Breaking out of docker containers

How misconfigurations lead to privilege escalation

Handling duplicate content on websites

Avoiding chaotic search engine ranking for domains

How malicious software uses dynamic linking to evade detection

When even linux system utilities lie to you

Simplifying docker web hosting with traefik

From simple ingress to automatic SSL and rate limiting with just a few container labels

Manual web application fingerprinting

Understanding what information attackers are looking for