Protecting The Wire – Semaphore Behind SSL Proxy

Mission Brief

Plain text communication is loud. It’s bleeding data.
Prying eyes can see every bit in the wire.

You have to isolate the backend – the Semaphore UI and MySQL containers stay locked down. Unreachable for the external work.
Open a tiny hole on the stronghold to the world – the frontend is an NginX SSL proxy.

You use:

  • Podman pod for network and container isolation
  • The Semaphore and MySQL containers without exposing them to the world
  • An NginX proxy container with SSL
Continue reading “Protecting The Wire – Semaphore Behind SSL Proxy”

Vulnerabilities Included – Vibe Coding Security

Computers are an integral part of our lives.
They manage our bank accounts.
They power the grids that light our cities.
Remote work.
Messaging.
Dating.

In the core – there is code.
Structures of instructions for the computer.

Vibe Coding?
You say it normally as a human.
AI translates it to the machine.

But does it really understand you?

Continue reading “Vulnerabilities Included – Vibe Coding Security”

The Silent Operator’s Language – Common Lisp Basics

Languages rise and fall.
Syntactic sugar.
Hair-raising formulas.
One claims speed. Another elegance.

Common Lisp stayed silent.
Evolved in peace.
Only a few were brave enough to touch it.
Even fewer live in it daily.

It’s not just old. It’s alive.
Ghost-grade tool.
No hype. No noise.
Longevity.

We begin with the basics – the kind you can build an entire operation on.
It’s not a tutorial. It’s a field manual.

Continue reading “The Silent Operator’s Language – Common Lisp Basics”