Cyber Security
Security I built WG YubiKey Manager because I got tired of WireGuard configurations sitting in plaintext on my disk. Every security-conscious developer has that moment when they realize their VPN private keys are
Security Bitwarden’s «Login with device» feature is brilliant , tap a notification, approve, and you’re in without typing a password. But approving requires the full Bitwarden app with your
Security Nuke Device is a remote device management system I built for enterprise security scenarios where you need the ability to remotely wipe, lock, or verify connectivity of Android devices in the field.
Security Dubai startups are prime targets for cyberattacks, high-value data, rapid growth, minimal security. As a fractional CTO with 6 patents in information security and hundreds of projects across dozens of
Security Veeam Telegram Notifier is a lightweight Go application I built for monitoring Veeam Backup & Replication 12 with real-time Telegram notifications. It runs as a Windows Service that watches the Event
Security Ansible WSL is a minimal, Docker-based infrastructure I built for staged SSH key deployment across Ubuntu servers. The project solves a common problem: transitioning from password-based authentication
Security This project implements a Session Border Controller (SBC) using Kamailio/OpenSIPS in Docker for securing 3CX phone systems. The Kamailio SBC for 3CX solution handles SIP traffic routing, RTPEngine for
Security Sys_Bot is a Telegram bot I built for streamlining domain management and security operations. It integrates Cloudflare DNS management, Let’s Encrypt SSL certificate automation with DNS-01 challenges
Security How to properly screen employees before hiring? Key methods for background checks, risk reduction, and ensuring security compliance.
Security Running a business on the internet opens up vast opportunities but also entails numerous hidden risks. An entrepreneur must understand what is strictly forbidden online—both legally and ethically—to avoid