Set up your own VPN

A Virtual Private Network (VPN) is used to extend an existing private network across the internet (public network). VPN enables connected devices all over the world to interact through an encrypted connection as if they were connected directly to the private network. Undoubtedly this opens several obvious advantages. Therefore, it’s not surprising that almost every company and also many private technically versed households hold their own VPN-Server. In the last 10 years, I have set Read more…

Synology – Import Photo Station Data into Moments

I recently bought a Synology DS218+ to manage data and especially photos. For this purpose, Synology offers different packages that can be installed within the Network Attached Storage to extend the feature set.To fulfill my photo managing use-case (upload/backup, edit, group photos automatically according to topics and persons, …), I need two independent working packages called Photo Station and Moments. Problem Description Both packages, of course, use it’s own database managing files, index, and so Read more…

Play with Docker (PWD) – An Amazing One-Click Docker Playground Project

Last week I found an amazing valuable in-browser Docker solution hacked by Marcos Nils and Jonathan Leibiusky and sponsored by Docker Inc.   About PWD PWD is a Docker playground that allows launching and using Docker Containers in your browser within seconds. You don’t need to install anything!!!Just visit https://labs.play-with-docker.com, log in with you Docker Hub user and play around with a free Alpine Linux Docker Container in your browser. Of course, the base Alpine Linux container Read more…

Private DNS-Server in 3 Steps

There are several reasons to use a private DNS-Server within a network.
This post is about how to set up a private DNS-Server based on Pi-hole and using Docker. Pi-hole is a very lightweight, scalable, robust, open-source software that provides a beautiful and responsive web interface to control the DNS-Server and view statistics.

Dynamic OAuth Client Configuration using Spring Security

OAuth 2.0 is the industry-standard protocol for authorization or to be precise a specification for issuing access tokens defined in RFC 6749. It focuses on client developer simplicity while providing specific authorization flows for different kinds of applications.For a detail description of the different OAuth 2.0 flows, I recommend reading through this post. Problem Description The configuration of OAuth consists of some OAuth provider-specific server configuration (server endpoints) and a client configuration (clientID, secret, accessTokenUri, scope…). Read more…

Building a Kubernetes Cluster within 15 minutes

In this blog post, I provide a basic guide on how to become a Kubernaut and set up your own Kubernetes Cluster. Kubernetes (K8s) … is Greek for helmsman or captain. And this is what Kubernetes is about – Shipping your containerized applications. Kubernetes is a system for automating deployment scaling management of containerized applications. Kubernetes manages the Computing Infrastructure Networking Infrastructure Storage Infrastructure for your containers. It manages everything around your application. Read more. Read more…

A basic introduction into Jigsaw and the impact on Java-Application startup time as well as the footprint

Years ago monolithic software often seems widespread while in recent years developers have focused on structuring their application architecture into technical components to achieve maintainable self-contained software units. Since Java offered no direct support to separate different parts of software functionality, using Maven modules in combination with naming conventions has been a quite widespread approach. Introduction to Jigsaw With Jigsaw a general module system was introduced into Java 9 which provides the native module formation Read more…

Android Application Security Evaluation

In 2019 I received my Master’s degree from the Vienna University of Technology for my thesis on Efficient Automated Analysis of Android-Applications Related to IT-Security Based on Open-Source-Tools.

To provide the ability of automated Android-Application security testing on different security fields, I implemented a web-based Testing as a Service (TaaS) Framework as part of my master thesis with the focus on…