Exposing JWT vulnerability in Neo4J's GraphQL(v3) Auth Layer
How a few lines of missing documentation might have led to unauthorized access to thousands of apps using Firebase Auth and Neo4j's GraphQL library.

Search for a command to run...
How a few lines of missing documentation might have led to unauthorized access to thousands of apps using Firebase Auth and Neo4j's GraphQL library.

Occasionally, we folks using Linux find our selves in situations where things break; our computers do not function as intended. In my scenario, I was out on business in another country, and my WiFi device was simply not showing up after a reboot. I k...

Exploring possibilities with the power language models

Learning new things or building new things requires rapid prototyping. This is a guide on how to create a VM template using a raw image and LVM-Thin storage. We're using an ubuntu cloud image in this. get https://cloud-images.ubuntu.com/noble/current...
I had a weird notion that proxmox was throttling the network throughput of guests, however today I discovered that it was only due to the CPU of the guest machine. Here's the scenario. I have a 1GBPS connection to the internet. All machines in my off...
A gentle introduction to userspace instrumentation
In this blog, we will continue with tracing. We'll aim to get a basic understanding of: How processes work Exit codes Forking of processes Exit tracepoints (of the execve() syscall) Recommended reading: If you've not read the first article, ple...
Enter God mode
I'm looking at you, Azure.