Science & DesignA Very Short Case Study of the Removal of a Toxic Big Tech LeaderThis is how employees can win: be prepared.Oct 31Oct 31
Science & DesignBetter Time Estimation for Software ProjectsEvery team member and project is different. Planning can be really hard to get right.Oct 23Oct 23
Science & DesignHow to use Hush Line with Proton MailEasily make your secure tips seamlessly work with the leading encrypted email providerOct 22Oct 22
Science & Design5 Tips for Hiring and Applying for JobsHiring is hard. Here are a few things I’ve learned.Jun 6Jun 6
Science & DesignPrinciples of a Tip Line PlatformA research-based way to evaluate whistleblower systemsMay 13May 13
Science & DesignHow to set up SSH login using a YubiKeyRequire a physical security key to log in to your serverApr 27Apr 27
Science & DesignSafeguarding Your Application: A Practical Guide to SQL Injection TestingUncovering and Fixing SQL Vulnerabilities Before They Become ThreatsMar 10Mar 10
Science & DesignHush Line Security Spotlight: Restricting the FILE Privilege in MySQL and MariaDBHardening your database through the principle of least privilegeMar 8Mar 8
Science & DesignHush Line Security Spotlight: Securing Database Connections with SSLUsing Let’s Encrypt to secure your database connectionFeb 25Feb 25
Science & DesignHush Line Security Spotlight: OCSP StaplingBetter privacy, performance, and reliability for your web appFeb 22Feb 22