diff --git a/data/articles.lisp b/data/articles.lisp index ea4ded4..3c565e5 100644 --- a/data/articles.lisp +++ b/data/articles.lisp @@ -61,103 +61,103 @@ :id "traefik-centralized-logging" :date "20230425" :tag "sdn docker compose logging limacharlie adapter traefik accesslogs configuration" - :author "Tommy") + :author "Tommy Skaug") (post :title "Software-Defined Networking Made Possible with Docker and Tailscale" :id "sdn" :date "20230424" :tag "sdn docker tailscale traefik compose funnel configuration" - :author "Tommy") + :author "Tommy Skaug") (post :title "Setting up NixOS on vps2day" :id "nixos-vps2day" :date "20210717" :tag "nixos vps2day installation" - :author "Tommy") + :author "Tommy Skaug") (post :title "Decommissioning Matrix: Moving to XMPP for Instant Messaging" :id "xmpp" :date "20210516" :tag "matrix xmpp decommissioned transtion messaging" - :author "Tommy") + :author "Tommy Skaug") (post :title "Email Records Show Microsoft Dominating In Norwegian Businesses and Government" :id "microsoft-dominating-email" :date "20210330" :tag "microsoft o365 cloud google amazon distribution trends monopoly" - :author "Tommy") + :author "Tommy Skaug") (post :title "Finding Cyber Security Signals in The RSS and Twitter Noise" :id "signals-feeds" :date "20210216" :tag "feed twitter otx rss aggregation search graph gremlin" - :author "Tommy") + :author "Tommy Skaug") (post :title "Using GnuPG with OpenSSL for Encryption and Decryption" :id "gpg-openssl" :date "20201118" :tag "openssl ssh gnupg encryption decryption crypto" - :author "Tommy") + :author "Tommy Skaug") (post :title "SSH Certificates and Keys in Apple T2 On-host" :id "ssh-certs-apple-t2" :date "20201014" :tag "architecture ssh apple t2" - :author "Tommy") + :author "Tommy Skaug") (post :title "SSH Certificate Signing, Proxying and Smartcards" :id "ssh-ca-proxyjump" :date "20201013" :tag "architecture ssh proxyjump smartcard pkcs11 ssh-ca certificates signing" - :author "Tommy") + :author "Tommy Skaug") (post :title "Taking The Cyber Highground: Reverse Proxies to The Rescue" :id "vantage" :date "20201007" :tag "beyondcorp zerotrust microsegmentation monitoring traceability defendable architecture" - :author "Tommy") + :author "Tommy Skaug") (post :title "Avoiding Distractions in Modern Computing" :id "distractions" :date "20200613" :tag "personal workflow unix" - :author "Tommy") + :author "Tommy Skaug") (post :title "Automatically Locking OpenBSD When Closing Lid" :id "apm-lock" :date "20200520" :tag "apm lock openbsd" - :author "Tommy") + :author "Tommy Skaug") (post :title "New Blog Plan" :id "new-format" :date "20200519" :tag "blog" - :author "Tommy") + :author "Tommy Skaug") (post :title "The Basics of osquery: Fleet Monitoring" :id "osquery" :date "20180817" :tag "forensics remote endpoint logging monitoring" - :author "Tommy") + :author "Tommy Skaug") (post :title "Taking Cyber Security to The Next Level With Cognitive Automation" :id "cognitive-automation" :date "20180805" :tag "automation concept cognition" - :author "Tommy") + :author "Tommy Skaug") (post :title "Travelling With Electronic Devices" :id "travel" :date "20180803" :tag "travel digital devices chromeos ios" - :author "Tommy") + :author "Tommy Skaug") (post :title "Using Matrix For Out-of-Band Communications" :id "matrix" :date "20180711" :tag "matrix e2e realtime" - :author "Tommy") + :author "Tommy Skaug") (post :title "Telemetry and Modern Workspaces: A Three-Headed Hound" :id "telemetry" @@ -170,61 +170,61 @@ makes it insufficient to solely rely on network monitoring. Through this post we are going to focus on the current challenges." - :author "Tommy") + :author "Tommy Skaug") (post :title "Indicators: A Nightmare" :id "indicators" :date "20180221" :tag "indicators communications storage format standards" - :author "Tommy") + :author "Tommy Skaug") (post :title "Graphs at Scale, Titan-Rexster: Gephi Visualization Options" :id "graphs-scale" :date "20150216" :tag "graph rexster gephi scaling visualization" - :author "Tommy") + :author "Tommy Skaug") (post :title "A Graph Experiment with Threats and Incidents" :id "graph-experiment" :date "20150216" :tag "python graph neo4j applied" - :author "Tommy") + :author "Tommy Skaug") (post :title "Booting a Mac Mini (OCT 2014) with Debian 8.0 " :id "mac-mini-debian" :date "20150206" :tag "macmini mac apple debian boot installation os" - :author "Tommy") + :author "Tommy Skaug") (post :title "Search All The Maltego Graphs" :id "maltego-search" :date "20141004" :tag "maltego search cli" - :author "Tommy") + :author "Tommy Skaug") (post :title "Remote Forensics is the New Black" :id "remote-forensics" :date "20140920" :tag "forensics remote" - :author "Tommy") + :author "Tommy Skaug") (post :title "Converting PST Archives In OS X/Linux with libpst" :id "converting-pst" :date "20140828" :tag "conversion pst email linux osx" - :author "Tommy") + :author "Tommy Skaug") (post :title "Performance Tuning for jNetPcap In a Clustered Environment" :id "jnetpcap-tuning" :date "20140616" :tag "jnetpcap cluster tuning" - :author "Tommy") + :author "Tommy Skaug") (post :title "Comments on the Norwegian Privacy Report 2014 - Current State and Trends" :id "privacy-report-2014" :date "20140130" :tag "chilling privacy opinion" - :author "Tommy") + :author "Tommy Skaug") (post :title "An OpenIOC Graph: A Different Kind of Rule Scheme" :id "an-openioc-graph-a-different-kind-of-rule-scheme" @@ -235,17 +235,17 @@ Maltego graphs or in other places where it is hard to work with them, and not least share them between systems. This article describes a system where indicators is loaded into a graph." - :author "Tommy") + :author "Tommy Skaug") (post :title "Reading MSG and EML Files on the Command Line" :id "msg-eml" :date "20131008" :tag "msg eml convert macos nix" - :author "Tommy") + :author "Tommy Skaug") (post :title "A Novel Way of Detecting Malicious PDF Documents" :id "novel-pdf-detection" :date "20120317" :tag "clustering javascript anomaly shadowserver dataset" - :author "Tommy") + :author "Tommy Skaug")