Robert Svensson
IT-security guy with a passion for books, poetry and abstract impressionism

Going serverless with AWS Lambda and Python

Polly Politician is looking to get voted into office. She has teamed up with Selly Celebrity, and together they are running an SMS voter campaign.

Read more...

Robert Svensson

Tags: #python #twilio #contentful #SMS #API #serverless #aws lambda #zappa


The free way to protect your privacy online

Everyone has the right to respect for his private and family life, his home and his correspondence. That sounds like freedom to me. In fact, that first sentence was put into writing over sixty years ago. It can be found in the European Convention on Humas Rights under article eight — Right to respect for private and family life.

Read more...

Robert Svensson

Tags: #privacy #security #vpn #opera


Impressions from 34C3 In Leipzig

It’s big — very big. The last time I visited the congress was around ten years ago. This was back when the event was held in Berlin. Since then, it has moved to Hamburg and now temporarily to Leipzig.

Read more...

Robert Svensson

Tags: #34c3 #leipzig #ccc #chaos computer club


macOS High Sierra Hack

Do you find having to type in the root password annoying and time-consuming? Then this security vulnerability is for you. Read this article to learn how easy it is to exploit this vulnerability in macOS High Sierra.

Read more...

Robert Svensson

Tags: #macOS #hack #password


The Right Way To Render Markdown With Flask

Sooner or later you’re going to run into markdown that you need to render inside a Flask app. This article will tech you the best way to render markdown in a modern way. You will also learn how to enable code highlighting to make those code snippets in your markdown shine brighter that the sun.

Read more...

Robert Svensson

Tags: #python #flask #markdown #highlight.js


Turn markdown into HTML using markdown-it

Markdown is great. It's easy to learn, has a reasonably straight forward sytax and is supported by many platfroms. But sometimes you need to more functionality than markdown traditionally allows. Like support for inserting id and class attributes for example.

Read more...

Robert Svensson

Tags: #JavaScript #browserify #markdown-it #markdown-it-attrs


An Introduction To Nmap

One of the most well-known network scanners is Nmap. With a name derived from network mapper, Nmap has been around since 1997 and continues to be actively developed. As of March 2016, the latest stable version is 7. Nmap’s speed, reliability, and customization options have made it the preferred go-to tool for many network and security professionals.

Read more...

Robert Svensson

Tags: #nmap #scanning #fingerprinting #nmapscriptingengine #tcpscan #udpscan


Automated Vulnerability Scanners

Automated vulnerability scanners, or AVS, are great. They can quickly scan a vast network for vulnerabilities for a fraction of the cost of bringing in a dedicated security tester. AVS can also be scheduled to do its work in a way that no human can. Furthermore, AVS are outstanding when it comes to scanning large network segments and comparing the result against a predefined security baseline or a previous scan.

Read more...

Robert Svensson

Tags: #vulnerabilityscanners #AVS #penetrationtesting


How To Become A Penetration Tester

Being a good security tester takes a lot of passion and dedication. An interesting side to the security tester profession is that there will always be new threats and vulnerabilities to dig into. While the never-ending flood of reported security breaches may seem somewhat intimidating, the following list of tips on how to become a better security tester might help you stay afloat.

Read more...

Robert Svensson

Tags: #advice #penetrationtester #top10advice


Network Ports

A fundamental part of most security tests is to scan the in-scope network segment for available services. These services, also known as network daemons, are processes that run on networked systems and listen to incoming network traffic through the use of ports. The available range of port numbers goes from 0 to 65,535. Depending on the type of application, services can listen to incoming requests over TCP or UDP, and sometimes both.

Read more...

Robert Svensson

Tags: #ports #network #securitytesting


What Is A Vulnerability?

Before we learn how to search for vulnerabilities, we need to have a solid understanding of what a vulnerability in the world of IT is. According to the European Union Agency for Network and Information Security (ENISA), a vulnerability is “the existence of a weakness in the design or in an implementation that can lead to an unexpected, undesirable event compromising the security of the computer system, the network, the application, or the protocol involved.”

Read more...

Robert Svensson

Tags: #vulnerability #C.I.A. #confidentiality #integrity #availability


This is the personal website and article collection of me — Robert Svensson. I currently work for Contentful writing about APIs, coding and the future of content management

You can also find out what I'm up to by following me on GitHub, Twitter and LinkedIn. Feel free to send me an e-mail at [email protected]