Levi LOL

Vaultless Passwords

I recently built a site for managing passwords without the need for a vault. Since there is no vault (online storage of passwords), there is nothing to hack or leak. There are also no servers for …

Cyberwarfare

Is it time we update our definition of a War Crime? Should civilian computers and networks be off-limit to hackers? Hacked It seems like everyone is getting hacked. Who protects us? Are there rules? …

SSH Keys

SSH keys are really neat! The DigitalOcean article on How To Set Up SSH Keys does an excellent job on explaining what SSH keys are and how to create them. In short, SSH keys are much more secure than …

Content Security Policy (CSP) Report URI for free

Content Security Policy (CSP) is a great way to protect your sites. You implement it by adding a header to your web server’s HTTP response. The hardest part, in my opinion, is finding out where you …

Cloudflare Firewall Rules to Protect WordPress

Cloudflare Firewall rules a protecting my site from a brute force attack from a botnet. Below I’ll show you how to use Firewall Rules to keep your WordPress site safe. With the Cloudflare free plan, …

How to secure your PHP Web App with a simple Firewall

I was trying to find a simple way to secure my PHP Web App when I realized how difficult it could be. Securing it the easy way cost more money than I’m willing to spend, so I decided to build my own …

Securing a Server

This post will cover securing a Linux server. Back in the day, I started with Red Hat 6 and Slackware 4; I still have a book from when I was learning Red Hat 6. I also ended up learning FreeBSD, but …