photo of the author

@victoria.dev

613 days ago

Both Internet users and Internet-connected applications can benefit from investing in cybersecurity. One core aspect of online privacy is the use of a proxy server, though this basic building block may not be initially visible underneath its more recognizable forms. Proxy servers are a useful thing …

#cybersecurity #websites

photo of the author

@victoria.dev

619 days ago

This, in fact, was my first post written entirely in Vim! I typically use Visual Studio Code but recently decided to become more comfortable with keyboard shortcuts. In the process I got more accustomed to visual mode, and finally got around to figuring out buffers. 😅

Remarkably, now when I go back …

photo of the author

@victoria.dev

620 days ago

Last week, I wrote about the importance of properly handling user input in our websites and applications. I alluded to an overarching security lesson that I hope to make explicit today: the security of our software, application, and customer data is built from the ground up, long before the product …

#cybersecurity #privacy #data #websites

photo of the author

@victoria.dev

627 days ago

Software developers have a lot on their minds. There are are myriad of questions to ask when it comes to creating a website or application: What technologies will we use? How will the architecture be set up? What functions do we need? What will the UI look like? Especially in a software market where …

#cybersecurity #data #websites

photo of the author

@victoria.dev

629 days ago

While not the brightest of the bunch, Bob’s rendition of “I will always love you” at karaoke night had everyone blown away.

photo of the author

@victoria.dev

629 days ago

Well, my afternoon is booked.

photo of the author

@victoria.dev

631 days ago

I prefer, “move at a reasonably maintainable fast speed while breaking things and then fixing them” but I guess that’s too long to be a sticker.

photo of the author

@victoria.dev

633 days ago

TIL: https://tools.ietf.org/html/rfc1178

My next computer will be named “whos-on-first”.

photo of the author

@victoria.dev

634 days ago

Rolling your own Virtual Private Network (VPN) is complicated. I put a lot of time and effort into setting up OpenVPN on my own AWS EC2 instance, yet was still delighted to outsource the ongoing maintenance when I found my preferred privacy-focused VPN.

That said, there’s no better way to …

#aws #cybersecurity #linux

photo of the author

@victoria.dev

636 days ago

Wanted: ability to grep IRL, as in, grep -Hrnwiv soy frozen_food_aisle/

… Ok ok

  • H: with filename
  • r: recursive
  • n: print line number in file
  • w: match the whole word
  • i: ignore case
  • v: invert matching (select non-matching lines)