cr0hnCyclomatic Complexity in Software Development and Its Impact on CybersecurityExploring the cyclomatic complexity in software development and its impact on cybersecurity, including its effects on code quality and·9 min read·Feb 15, 2024----
cr0hnEnhancing SSH Server Security: Configuring OTP for SSH Accesswe’ll explore the implementation of One-Time Passwords (OTP) as an additional layer of security for your SSH server.·2 min read·Jun 20, 2023----
cr0hninBetter ProgrammingRedis vs. KeyDB — My Performance Test and ConclusionsIs KeyDB faster than Redis?·4 min read·Feb 6, 2023----
cr0hnWonderful Python Libraries series Nº 2 :: Python Secure Secret StorageTreat with sensitive information is a must. But every so often, it is not easy.2 min read·Aug 29, 2022----
cr0hnEfficient memory usage in Python with Zero-copyPython has a lot of magic with memory under the hood and, in most cases, Inefficiently.1 min read·Aug 22, 2022----
cr0hnWonderful Python Libraries series Nº 1 :: Prompt ToolkitToday I start a new series of posts with my favorite Python libraries. I’ll share with you those that, I think, is most interesting.2 min read·Aug 20, 2022--1--1
cr0hnAuto-generating Regular expressions from a wordlists with PythonMaking regular expressions (REGEX) is sometimes an arduous task.1 min read·Aug 12, 2022----
cr0hnMeasuring the performance of Python chunks in different environmentsThere are many libraries for measuring the performance of Python code. These tools are called profiling tools.3 min read·Aug 8, 2022----
cr0hnDevSecOps series №4 — Protecting environment variables in the most well-known C.I. systemsWell-known automation systems have specific features to manage sensitive information. I’ll cover the four most common automation systems3 min read·Aug 24, 2021----
cr0hnDevSecOps series No 3 — Old-fashion issues in DevOps: Zip Bombs.Today I’ll talk about an old-new attack that can affect your production systems: a Zip bomb.4 min read·Aug 21, 2021----