This is my website!
Recent Blogs
See MoreExploring a Github Security Vulnerability scam.
Today, I received an email claiming that a security vulnerability had been detected in one of my GitHub repositories. Typically, I receive security notifications from Dependabot, which direct me back to GitHub for further action.
Cultural Beliefs vs. Rationality (Self-Fulfilling Prophecy)
Culture is the collective manifestation of knowledge, beliefs, customs, arts, laws, and practices shared by a group of people and it influences every aspect of life, from language, food, and clothing to values, traditions, and societal structures. Culture is mostly inherited from the previous generations of an individual.
Fix the CrowsStrike issue, quickly and easily
Build a Windows-PE image to delete the required files that caused CrowdStrike's Falcon Scanner to break and crash Windows installations on boot. You can also export all of the recovery keys from the Active Directory to a CSV file and use them to recover devices quickly - with almost a plug and play experience.
Windows 7 in 2024
This is my journey of installing Windows 7 for minimal office use in Sri Lanka. The device that i'm dealing with today is an ancient Dell Inspiron N4050 from 2014 (a 10 year Intel i3 laptop).
Beeper - Sounds like a secuirty nightmare
An all-in-one messaging platform that's too good to be true!
SNI Spoofing Analysis
In today’s internet, SNI (Server Name Indication) plays a critical role in making secure connections. However, the SNI field is sometimes used as a gatekeeper to restrict or manage content access. This blog post will walk through what SNI spoofing is, why it works, and demonstrate how to implement a basic SNI spoofing proxy in Python.