Bypassing Firewalls - But why?

This is the first post of many, in which I will touch the topic of bypassing Firewalls. This being the Introduction of this Series, I will focus on setting the topic up, providing explanations and all that stuff [...]

Trust is good, cryptography is better

Trust is good, cryptography is better Recently, I have seen a lot of people in the InfoSec- and Online Privacy Community having lenghty discussions about which companies we can trust these days. In this article I write about why I think this isn't the right approach we should take [...]

Google Dork's - Sometimes it really is that easy

One day, I was watching some DefCon talks at YouTube, as I often do. One of the videos was titled “Google Hacking for Penetration Testers”. This title sounded very interesting, but also didn’t tell me much about what to actually see in there. So naturally, I watched it. It was amazing [...]