Bevorzugen Sie Deutsch? Einige Artikel und mehr über mich gibt es auch in meiner Muttersprache.

Today, any device is networked, not only our personal devices, but anything from the fridge to the power plant. This implies endless possibilities, but also possibilities galore for anything to go wrong. Decades of thorough theoretical and hands-on experience enables me to guide you toward the right solution for anything networked. Learn more…

Recent technical essays

  • DEFCON Voting Village 23 Panel
    There was a DEFCON Voting Village panel «If I can shop online, why can’t I vote online?» which I found extremely important to read or listen to. Not just for me, in fact, for anyone talking about electronic voting. Here… Read more: DEFCON Voting Village 23 Panel
  • Counting like a computer
    Computers are very good at counting. But usually only within narrow limits. Here is an insight into where these limits come from and what goes wrong when they are exceeded.
  • SMTP Smuggling Status
    «SMTP Smuggling» is a vulnerability that allows to circumvent some mail checks at the receiver and therefore will allow additional spam and/or phishing messages through. Here is the list of what we currently know.
  • The year in review
    This is the time to catch up on what you missed during the year. For some, it is meeting the family. For others, doing snowsports. For even others, it is cuddling up and reading. This is an article for the… Read more: The year in review
  • Kensington PowerPointer for Linux LibreOffice
    Navigating the slides works perfectly with the Kensington PowerPointer for LibreOffice under Linux, no questions asked. The extra functions (“laserpointing”, drawing, and screen blanking) are not well supported. Here is how to fix them.
  • NFTs are unethical
    As an avid reader, you know my arguments that neither NFT nor smart contracts live up to their promises, and that the blockchain underneath is also more fragile and has a worse cost-benefit ratio than most believe. Similarly, I also… Read more: NFTs are unethical
  • Inefficiency is bliss (sometimes)
    Bureaucracy and inefficiency are frowned upon, often rightly so. But they also have their good sides: Properly applied, they ensure reliability and legal certainty. Blockchain disciples want to “improve” bureaucracy-ridden processes, but achieve the opposite. Two examples:
  • How to block AI crawlers with robots.txt
    If you wanted your web page excluded from being crawled or indexed by search engines and other robots, robots.txt was your tool of choice, with some additional stuff like <meta name=”robots” value=”noindex” /> or <a href=”…” rel=”nofollow”> sprinkled in. It… Read more: How to block AI crawlers with robots.txt

All blog posts…

Let’s stay in touch!

Receive a mail whenever I publish a new post.

About 1-2 Mails per month, no Spam.



Apache (4) Blockchain (17) Cloud Storage (11) Data Protection (5) Denial of Service (8) DNS (11) DNS-SD (6) DNSSEC (6) Fast Routers (20) Federated Services (6) Forwarding Lookups (4) FPGA (4) Hash Tables (8) Identity Management (6) Internet of Things (8) Intrusion Detection (6) JSXC (10) Linux (19) Mac OS X (5) Mobile Networks (7) MPLS (4) Multicast (15) NAT traversal (4) Network Processors (4) NTP (6) NTS (6) Opportunistic Networks (9) Peer-to-Peer (23) Privacy (16) Quality of Service (9) Replication (4) Security (53) Service Discovery (5) Social Networks (8) Timestamps (6) TLS Interposer (6) Traffic Engineering (9) Trust (8) Ubuntu (7) Usability (6) Web Applications (11) WISEchat (5) XML (8) XMPP (11) Zeroconf (6)