• Home

Apostolis Stergiou

Resilient Security and Supply Chain Attacks

Identifying and mitigating supply chain threats.

A Deep Dive into Linux with man7 Expert Training

Philosophizing my way through the first principles of Linux.

Optimise for decisions

What if we chose to optimise for decisions.

Man In The Middle in SCADA network

A MITM attack against the electrical grid.

Halting the callback chains

Troubleshooting esoteric events propagation.

Caching in HTTP/1.1

Traditional HTTP caching techniques.

Malware System Calls

System calls for malware analysis.

Character Orientations

Comments on Fromm’s theory of personality.

tshark and tcpdump

Debugging network issues with tshark and tcpdump.

Git bisect debugging

Finding out where and when the bug was introduced.

Posts navigation

1 2 Next »
Copyright © 20[0-9]{2} Apostolis Stergiou
Blog Way by Promenade Themes