netdevsJune 17, 2025 GeekSquadMacbook Pro Laptop Recovery Mac HFS+ Drive Forensic Recovery: From Imaging to File Organization This project documents the process of recovering images…
netdevsMay 11, 2025 Software SecurityReverse Engineering Firmware Drivers Recently, I took it upon myself to do some reverse engineering. From compressed binary back to directory structure,…
netdevsApril 23, 2025 Software SecurityProperly handling angr: ELF Docker Container Have an smooth and easy angr Experience A few days ago, I found myself staring at a reverse…
netdevsFebruary 12, 2025 Security ComplianceThe Case for Source Code Security Auditors across the SDLC Security programming introduces a distinct set of challenges that, if left unaddressed, can compromise both the efficiency and…
netdevsJanuary 3, 2025 Software SecurityStrict CSP for WordPress It’s been a long time coming. but here it is. I wrote this Security Fix for WordPress code…
netdevsDecember 4, 2024 Software SecurityISMS An Information Security Management System (ISMS) is a structured framework designed to manage sensitive company information, ensuring its…
netdevsNovember 28, 2024 Security ComplianceTop Challenges in ISO 27001 Implementation An Analysis of ISO 27001 Implementation Challenges: Timelines Project Management Have you planned enough time for your project?…
netdevsNovember 27, 2024 Security ComplianceISO 27001: A Step-by-Step Guide for SMBs Understand the ISO 27001 Standard Understanding ISO: The International Organization for Standardization (ISO) develops and publishes international standards…
netdevsNovember 18, 2024 Security ComplianceRisk & Compliance Managing risk and ensuring compliance is more crucial than ever. Organizations face a multitude of challenges that can…
netdevsOctober 8, 2024 Software SecurityWhy I don’t use unsafe-inline, and you shouldn’t either Building a CSP and then allowing unsafe-inline does nothing for your security. It’s worse than nothing. It’s a…