Rémi Lavedrine

Rémi Lavedrine @shostarsson

About: Software Dev turned Security Dev. Follow me on dev.to, twitch.tv/shostarsson or wildnsecure.com

Joined:
Aug 2, 2018

Rémi Lavedrine
articles - 46 total

8 Essential Services to Improve your Security on the Internet 🚀

Improving your security on the internet is an essential now. 🙋🏼 We see more and more...

Learn More 4 0Feb 10 '22

A Complete Explanation to DevSecOps

Devsecops It's one of the buzz words currently. Everyone wants to do it and...

Learn More 2 0Jan 27 '22

Dependency Confusion - How can you hack Apple, Microsoft and dozens of other companies?

A security researcher and his team have successfully deployed malware within the source code...

Learn More 3 0Nov 24 '21

Understand the TLS Handshake

To be safe on the Internet, it is essential to pass information through encrypted...

Learn More 4 0Oct 1 '21

Your data are Gold 💰

Elise is on fire 🔥 In the last episode of Cash Investigation, Elise Lucet hit hard again. We learn...

Learn More 3 2May 27 '21

Smartphone, a Spy in your Pocket

You've seen the latest episode of Envoyé Spécial (french TV). It's kind of scary ... Especially abou...

Learn More 2 1May 20 '21

IAAS, PAAS, SAAS, On-Prem. Let's explain these with the brand new Pizza as a Service

The Cloud is a great tool that allows you to scale up very quickly. But all is not so gentle i...

Learn More 2 0Apr 15 '21

How long to crack that password ?

Password is one of your best lines of defense against attackers, but they can crack it from you very,...

Learn More 1 0Mar 30 '21

Is this the future of the Yubikey ?

I feel like I have found the future of Yubikey. 🗝 ➡️ 🔑 The security of your identity on the I...

Learn More 3 2Mar 24 '21

9 Key Points about Passwords

Passwords!!! It's the Holy Grail of computer security. 🙈 Everyone would like to get rid of it...

Learn More 2 0Mar 15 '21

The 14 Financial Impacts of a Cyber ​​Attack 💸

Cyber ​​attacks are on the increase and can affect businesses, administrations, hospitals or individu...

Learn More 1 0Mar 10 '21

How much for my personnal data on the Dark Web ?

Since the Covid crisis, we have seen more and more attacks targeting hospitals and health establishme...

Learn More 1 0Mar 1 '21

Bandit CTF — 6 to 10 Challenges Writeup

A CTF is the perfect place to learn security skills in a safe environment, knowing you are not going...

Learn More 2 0Feb 24 '21

Bandit CTF - 1 to 5 Challenges WriteUp

Knowing where to start when I'm interested in offensive computer security can be tricky. Should you r...

Learn More 6 0Feb 15 '21

Should I train on CTF or Bug Bounty ?

Computer security is of interest to you, but you don't know where to start. You hear about CTF, Bug...

Learn More 5 0Feb 1 '21

WhatsApp Done. What about the Other Ones !!! - Cryptomator

In the past few weeks, there has been a massive exodus of WhatsApp to more privacy-friendly messaging...

Learn More 3 0Jan 25 '21

WhatsApp or Signal - Make an Informed Choice

Signal has seen incredible adoption in recent days, mainly due to a change in the WhatsApp T & Cs...

Learn More 1 0Jan 18 '21

Security by Design - Everything you need to know, in a simple manner.

Security by Design is a method that will allow your team to take security into account from the start...

Learn More 5 1Jan 11 '21

Mobile Password Management

Regaining control over these passwords is essential. The idea of ​​this post, and most of the post o...

Learn More 4 1Dec 28 '20

The Ultimate Yubikey

Using a 2nd Factor Authentication is already great. Using it with an app in your phone is great, doi...

Learn More 7 0Dec 27 '20

My Thoughts about the 2020 Github Universe

Netflix got incredibly good movies but I found something much more interesting. 🤟🏼 Github Universe !!...

Learn More 1 0Dec 14 '20

How to Connect an Android Phone to a Docker Container ? - ADB, Docker, VSCode

So, You decided to develop in Docker containers. 🐳 That’s a good choice because it solves a lot of p...

Learn More 20 1Dec 7 '20

Learn from Data Breach

October and November were pretty scary in terms of Data breaches. 😨👇🏼 In this video I am coming back...

Learn More 3 1Nov 30 '20

Debug your Go app in a Docker Container

Photo by Kevin Ku on Unsplash Recently, I discovered that you can develop in a Docker Container i...

Learn More 2 0Nov 23 '20

You've been on a Public Network ? That's bad Security Practice

Have you ever been on a Public Network ? I'm sure you had. We all had. Nevertheless, if you did...

Learn More 2 0Sep 9 '20

Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

Photo by Chase Clark on Unsplash In this article, I will explain that anyone can watch all of you...

Learn More 12 0Jun 23 '20

Don't you think you should stop pushing unsecure code on Github ? (OWASP)

In this article, I will explain what is the OWASP and how you can use it as a developer or a security...

Learn More 14 2May 15 '20

Use your Yubikey to its Fullest

Photo by Yogi Purnama on Unsplash On our way to make our accounts as secure as we possibly can, I...

Learn More 30 4Apr 29 '20

A Password is not Enough to Secure your Account. Use that as Well 🔐

Photo by Chunlea Ju on Unsplash In this article, I will explain why a password is definitely not...

Learn More 18 0Apr 14 '20

Password Attacks CounterMeasures ⚔️

Photo by Jonathan Ridley on Unsplash I will cover and answer your questions about everything that...

Learn More 30 2Mar 31 '20