Explore

2021

Mullvad OpenVPN Gateway

I am building a cybersecurity home lab. However, I do not like my ISP having all logs of my home lab activity. I do not know why but this feels threatening even if I am not planning to be a black hat.

The CIA triad in Information Security

In the vast and complex world of cybersecurity, these three terms help people communicate better using common and more conventional terminology.

Why IT recruitment is broken

What follows is my point of view about the I.T. recruitment system. After many years of being on both sides of the game, I would like to share some ideas about this subject and hopefully making life easier for everyone working in this field.

2017

Autonomous vs Automation testing

To perform any kind of effective testing activity it is required to have testing context awareness, healthy running environments, good sample data and a clear understanding of the business rules.

Automating bugs

Executing a set of SQL updates in order to prepare test data can be harmful. Legacy systems can be hard to maintain, improve, and expand because there is a general lack of understanding of the system.

Devs environment disorder?

Do developers prefer to work in chaotic environments? Let's face it, we need someone to blame when things do not work as expected.