Networking & Administration

What’s happening ‘inside’ encrypted Wifi networks?

Analyzing network connections with tools like Wireshark is usually straightforward if the traffic is accessible on a local interface. It’s...

Cross-site scripting (XSS) demo

The following example demonstrates a cross-site scripting attack that manipulates a website to display the content of a stored cookie....

Running custom Docker containers in the Google cloud

Docker is a great way to containerize applications and dependent libraries in a portable package. Using Linux’ OS level virtualization...