<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Rémi Lavedrine</title>
    <description>The latest articles on Forem by Rémi Lavedrine (@shostarsson).</description>
    <link>https://forem.com/shostarsson</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F88900%2Fd1c7cb23-11c8-497b-9e6f-3331eaefd9b5.jpeg</url>
      <title>Forem: Rémi Lavedrine</title>
      <link>https://forem.com/shostarsson</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/shostarsson"/>
    <language>en</language>
    <item>
      <title>Reclaim Your Tech: Why Microsoft’s Windows 10 EOL Is Linux’s Golden Opportunity</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Wed, 22 Oct 2025 05:00:00 +0000</pubDate>
      <link>https://forem.com/shostarsson/reclaim-your-tech-why-microsofts-windows-10-eol-is-linuxs-golden-opportunity-6mh</link>
      <guid>https://forem.com/shostarsson/reclaim-your-tech-why-microsofts-windows-10-eol-is-linuxs-golden-opportunity-6mh</guid>
      <description>&lt;p&gt;Microsoft’s decision to end support for Windows 10 isn’t just another software update—it’s a declaration: &lt;strong&gt;Your device is no longer yours to control.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Millions of machines, still powerful and capable, are now deemed obsolete, not because they’ve broken down, but because a corporation decided their time was up. &lt;/p&gt;

&lt;p&gt;This isn’t just an ecological scandal; it’s a reminder that when you buy a computer, you’re not truly buying freedom. You’re entering a lease agreement, where the terms can change—or terminate—without your consent.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd6qi3nn7buzonejvgvwb.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd6qi3nn7buzonejvgvwb.jpg" alt="Pile of Tech trash" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  But what if there were another way?
&lt;/h2&gt;

&lt;p&gt;What if you could use your hardware for as long as it lasts, without arbitrary restrictions or forced upgrades? &lt;/p&gt;

&lt;p&gt;That alternative exists, and it’s called &lt;strong&gt;Linux&lt;/strong&gt;.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftqvzd4c5r6h68seozg95.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftqvzd4c5r6h68seozg95.jpg" alt="linux.jpg" width="800" height="416"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Linux: The People’s Platform
&lt;/h2&gt;

&lt;p&gt;Linux has come a long way since its early days as a niche system for developers. Today, it’s a polished, user-friendly operating system that respects your privacy, your choices, and your hardware. Unlike Windows or macOS, Linux doesn’t spy on you, slow down over time, or hold your data hostage. It’s free—not just in cost, but in freedom. You decide when to update, what software to install, and how to use your machine.&lt;/p&gt;

&lt;p&gt;And no, you won’t be giving up the tools you rely on. The digital world has shifted: most essential services are now web-based. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Need to design ? &lt;a href="https://www.figma.com/" rel="noopener noreferrer"&gt;Figma&lt;/a&gt; and &lt;a href="https://www.canva.com" rel="noopener noreferrer"&gt;Canva&lt;/a&gt; replace Photoshop. &lt;/li&gt;
&lt;li&gt;Writing ? Google Docs or &lt;a href="https://www.onlyoffice.com/" rel="noopener noreferrer"&gt;OnlyOffice&lt;/a&gt; work seamlessly. &lt;/li&gt;
&lt;li&gt;Video editing ? It's covered with tools like &lt;a href="https://shotcut.com/" rel="noopener noreferrer"&gt;Shotcut&lt;/a&gt; or &lt;a href="https://kdenlive.org/" rel="noopener noreferrer"&gt;Kdenlive&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Gaming ? &lt;a href="https://store.steampowered.com/" rel="noopener noreferrer"&gt;Steam&lt;/a&gt;’s Proton lets you play Windows games natively, and more titles support Linux every day.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Backbone of the Internet
&lt;/h2&gt;

&lt;p&gt;Here’s a secret: Linux already powers the world. 🤫&lt;/p&gt;

&lt;p&gt;It runs the servers behind Google, Facebook, and Netflix. &lt;br&gt;
It’s the operating system of choice for supercomputers, NASA missions, and even your Android phone. &lt;/p&gt;

&lt;p&gt;If reliability, security, and efficiency matter to the giants of tech, why shouldn’t they matter to you?&lt;/p&gt;

&lt;p&gt;Linux is leaner, faster, and more secure than Windows or macOS. It doesn’t bog down with bloatware or background processes. It’s built for performance, which means your old laptop might suddenly feel like new again.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Ultimate Platform for Creators and Security Professionals
&lt;/h2&gt;

&lt;p&gt;If you’re a developer, designer, or cybersecurity professional, Linux isn’t just an option—it’s the best tool for the job. Most programming languages, frameworks, and security tools are built with Linux in mind. &lt;br&gt;
Docker, Kubernetes, Python, and even ethical hacking tools like &lt;a href="https://www.kali.org/" rel="noopener noreferrer"&gt;Kali Linux&lt;/a&gt; run natively, without the compatibility headaches of Windows.&lt;/p&gt;

&lt;p&gt;For security, Linux is unmatched. Its open-source nature means vulnerabilities are spotted and fixed faster. You’re not relying on a single company’s whims for patches—you’re part of a global community that values transparency and control.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Movement, Not Just an OS
&lt;/h2&gt;

&lt;p&gt;Switching to Linux isn’t just about escaping Windows 10’s end-of-life. It’s about joining a movement that believes technology should empower, not enslave. It’s about supporting a future where your devices serve you, not corporations.&lt;/p&gt;

&lt;p&gt;The tools are ready. The community is welcoming. And the best part !! You don’t need to be a tech expert to make the switch. &lt;br&gt;
Distributions like &lt;a href="https://ubuntu.com/" rel="noopener noreferrer"&gt;Ubuntu&lt;/a&gt;, &lt;a href="https://www.linuxmint.com/" rel="noopener noreferrer"&gt;Linux Mint&lt;/a&gt;, or &lt;a href="https://system76.com/pop/" rel="noopener noreferrer"&gt;Pop!_OS&lt;/a&gt; are designed for everyone, with intuitive interfaces and step-by-step guides.&lt;/p&gt;

&lt;p&gt;So ask yourself: Do you want to keep renting your digital life, or is it time to take back control? &lt;/p&gt;

&lt;p&gt;The choice—and the power—is yours.&lt;/p&gt;

</description>
      <category>linux</category>
      <category>opinion</category>
    </item>
    <item>
      <title>8 Essential Services to Improve your Security on the Internet 🚀</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Thu, 10 Feb 2022 10:46:56 +0000</pubDate>
      <link>https://forem.com/shostarsson/8-essential-services-to-improve-your-security-on-the-internet-26j1</link>
      <guid>https://forem.com/shostarsson/8-essential-services-to-improve-your-security-on-the-internet-26j1</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/czFimENgMJI"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;Improving your security on the internet is an essential now. 🙋🏼&lt;/p&gt;

&lt;p&gt;We see more and more individuals having their accounts hacked. 😳&lt;/p&gt;

&lt;p&gt;However, it is possible to be safe by using services to protect yourself, protect your identity on the internet or even your browsing or payments. 😊&lt;/p&gt;

&lt;p&gt;It's really wide, but very interesting. 👨🏼‍💻&lt;/p&gt;

&lt;p&gt;In this video, I give you the 8 essential points that you must follow as an individual to be safe on the internet.&lt;br&gt;
Or at least harder to hack than its neighbour. 🙅🏼&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;/p&gt;

</description>
    </item>
    <item>
      <title>A Complete Explanation to DevSecOps</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Thu, 27 Jan 2022 14:48:17 +0000</pubDate>
      <link>https://forem.com/shostarsson/a-complete-explanation-to-devsecops-nho</link>
      <guid>https://forem.com/shostarsson/a-complete-explanation-to-devsecops-nho</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/2cnKp3K3uKw"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;h2&gt;
  
  
  Devsecops
&lt;/h2&gt;

&lt;p&gt;It's one of the buzz words currently.&lt;/p&gt;

&lt;p&gt;Everyone wants to do it and everyone has a different vision of it, even a specific explanation. &lt;/p&gt;

&lt;p&gt;In the following video, I will not present the Truth to you, but rather my point of view and the clearest possible explanation through an example that should speak to everyone.&lt;/p&gt;

&lt;p&gt;When you're in the real world, you have something precious and you're trying to protect it at all costs, you build something solid and with a very specific way of creating it.&lt;/p&gt;

&lt;p&gt;Well, DevSecOps is not that different. so come with me, let's go back in time and discover computer security and DevSecOps through an example.&lt;/p&gt;

&lt;p&gt;DevSecOps and creating a castle in not that different.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;/p&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Dependency Confusion - How can you hack Apple, Microsoft and dozens of other companies?</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Wed, 24 Nov 2021 16:40:09 +0000</pubDate>
      <link>https://forem.com/shostarsson/dependency-confusion-how-can-you-hack-apple-microsoft-and-dozens-of-other-companies-2gfj</link>
      <guid>https://forem.com/shostarsson/dependency-confusion-how-can-you-hack-apple-microsoft-and-dozens-of-other-companies-2gfj</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/rKEUN_S6fVA"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;A security researcher and his team have successfully deployed malware within the source code of companies known to be at the top of computer security, such as Apple, Microsoft, Paypal or Shopify.&lt;/p&gt;

&lt;p&gt;Indeed, not really amateurs in terms of know-how to develop software in a secure way.&lt;/p&gt;

&lt;p&gt;Well despite this, this researcher has managed to go through all the defenses of his companies simply by going through the development libraries that all developers use so as not to have to constantly reinvent the wheel.&lt;/p&gt;

&lt;p&gt;By injecting malware into these libraries, he only had to wait for an update within these companies to be deployed without doing anything.&lt;br&gt;
Unstoppable.&lt;/p&gt;

&lt;p&gt;We talk about it in this video and I explain how to avoid falling into the trap yourself.&lt;/p&gt;

&lt;p&gt;And you, have you ever thought about this kind of attack method on your software?&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;/p&gt;

</description>
      <category>security</category>
      <category>programming</category>
    </item>
    <item>
      <title>Understand the TLS Handshake</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Fri, 01 Oct 2021 07:31:22 +0000</pubDate>
      <link>https://forem.com/shostarsson/understand-the-tls-handshake-3iip</link>
      <guid>https://forem.com/shostarsson/understand-the-tls-handshake-3iip</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/WD5oqjZXJFo"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;To be safe on the Internet, it is essential to pass information through encrypted communication. 🔐&lt;/p&gt;

&lt;p&gt;This is also called encrypted streams. 🔐&lt;/p&gt;

&lt;p&gt;But how does it work all these exchanges to arrive at a result where my data is in encrypted flows and it is inviolable? 🤔&lt;/p&gt;

&lt;p&gt;As a developer, I'm going to need to understand how all of this works so that I can implement it effectively in my app or website. 👨🏼‍💻&lt;/p&gt;

&lt;p&gt;As a security engineer, it is essential to know how it works in order to be sure that there are no potential vulnerabilities in the implementation of my web service. 👷🏼‍♂️&lt;/p&gt;

&lt;p&gt;As an individual "general public", it is classy to know these type of things to shine in society. 😄&lt;/p&gt;

&lt;p&gt;I'll explain all of that to you in this week's video .... 👆🏼&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;https://wildnsecure.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Your data are Gold 💰</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Thu, 27 May 2021 09:23:15 +0000</pubDate>
      <link>https://forem.com/shostarsson/your-data-are-gold-2omd</link>
      <guid>https://forem.com/shostarsson/your-data-are-gold-2omd</guid>
      <description>&lt;p&gt;Elise is on fire 🔥&lt;/p&gt;

&lt;p&gt;In the last episode of Cash Investigation, Elise Lucet hit hard again.&lt;/p&gt;

&lt;p&gt;We learn that data brokers, large-scale personal data sellers, are a reality. &lt;/p&gt;

&lt;p&gt;And that they resell data that has been aggregated without our consent.&lt;/p&gt;

&lt;p&gt;They are hiding behind anonymization, but a research team in England has shown us that this does not make things less complicated to find people very precisely.&lt;/p&gt;

&lt;p&gt;In short, a very interesting episode that we had to talk about.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/lNBl4W6-jys"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;https://wildnsecure.com&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Smartphone, a Spy in your Pocket</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Thu, 20 May 2021 08:26:49 +0000</pubDate>
      <link>https://forem.com/shostarsson/smartphone-a-spy-in-your-pocket-mac</link>
      <guid>https://forem.com/shostarsson/smartphone-a-spy-in-your-pocket-mac</guid>
      <description>&lt;p&gt;You've seen the latest episode of Envoyé Spécial (french TV).&lt;br&gt;
It's kind of scary ...&lt;/p&gt;

&lt;p&gt;Especially about one story about our phones and the numerous data shared through them that are sold, shared and used, most often without our consent.&lt;/p&gt;

&lt;p&gt;In my last video, I go over all the data that are shared through our phones.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/hXWLcASYBOQ"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;Understanding the amount of data shared and try to limit it is a good starting point.&lt;/p&gt;

&lt;p&gt;But also understanding what data hackers might be trying to get on my phone is important.&lt;/p&gt;

&lt;p&gt;And finally, that everyone understands that it is essential to reset your phone when you sell it as a second-hand device. 😉&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;a href="//wildnsecure.com"&gt;https://wildnsecure.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>privacy</category>
    </item>
    <item>
      <title>IAAS, PAAS, SAAS, On-Prem. Let's explain these with the brand new Pizza as a Service</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Thu, 15 Apr 2021 11:48:06 +0000</pubDate>
      <link>https://forem.com/shostarsson/iaas-paas-saas-on-prem-let-s-explain-these-with-the-brand-new-pizza-as-a-service-3ob</link>
      <guid>https://forem.com/shostarsson/iaas-paas-saas-on-prem-let-s-explain-these-with-the-brand-new-pizza-as-a-service-3ob</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/kWYFFRg4Ne8"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;The Cloud is a great tool that allows you to scale up very quickly.&lt;br&gt;
But all is not so gentle in the world of the Cloud. 🌩&lt;/p&gt;

&lt;p&gt;Indeed, there are many possibilities for using a Cloud solution. ☁️&lt;/p&gt;

&lt;p&gt;You can decide to be in charge of absolutely nothing.&lt;br&gt;
Just manage the application.&lt;br&gt;
Just to manage the machines.&lt;br&gt;
Or manage everything. And in this case, it's not really Cloud for me anymore.&lt;/p&gt;

&lt;p&gt;This diversity of operation is accompanied by a complicated nomenclature such as On-Prem, IaaS, PaaS or SaaS.&lt;/p&gt;

&lt;p&gt;It is complicated to clearly understand what the differences are between these solutions. 🤔&lt;br&gt;
Where does the first end, where the second begins.&lt;/p&gt;

&lt;p&gt;To simplify all this, I decided to cook up a little video for you that explains this concept through the example of making and eating a pizza. 🍕&lt;br&gt;
Let's call it "Pizza as a Service" and see how it will help us understand the concept of cloud solutions. 📺&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;/p&gt;

&lt;p&gt;If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;https://wildnsecure.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>How long to crack that password ?</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Tue, 30 Mar 2021 07:38:26 +0000</pubDate>
      <link>https://forem.com/shostarsson/how-long-to-crack-that-password-p45</link>
      <guid>https://forem.com/shostarsson/how-long-to-crack-that-password-p45</guid>
      <description>&lt;p&gt;Password is one of your best lines of defense against attackers, but they can crack it from you very, very quickly. 💨&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/KIVno9B8xDI"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;But how quickly a hacker will be able to crack it. 🔓&lt;br&gt;
The answer is, it'll be pretty quick if I don't use lots of upper case, lower case, numbers and special characters. ㊙️&lt;br&gt;
We watch it together in the video. 📺&lt;/p&gt;

&lt;p&gt;This will allow you to set the correct level of complexity for your own passwords.&lt;br&gt;
You will see the gap is not huge to go from a password that cracks instantly to a password that takes several tens (hundreds) of years to be cracked.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter on our website. &lt;a href="https://wildnsecure.com/contact" rel="noopener noreferrer"&gt;https://wildnsecure.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Is this the future of the Yubikey ?</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Wed, 24 Mar 2021 08:41:48 +0000</pubDate>
      <link>https://forem.com/shostarsson/is-this-the-future-of-the-yubikey-2chd</link>
      <guid>https://forem.com/shostarsson/is-this-the-future-of-the-yubikey-2chd</guid>
      <description>&lt;p&gt;I feel like I have found the future of Yubikey. 🗝 ➡️ 🔑&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/xImfPcHywzU"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;The security of your identity on the Internet requires the security of your accounts and therefore your passwords. ㊙️&lt;/p&gt;

&lt;p&gt;And to reinforce that, we can go through Hardware Tokens, like the Yubikey. Or the OnlyKey. 🔑&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Is this new MFA token the future of Yubikey? 🤔&lt;/li&gt;
&lt;li&gt;Will this new MFA token replace the Yubikey? 🤔&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is the OnlyKey&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp26yg0r14ufipunf15rv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp26yg0r14ufipunf15rv.png" alt="An OnlyKey" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We talk about it in this video. 🙋🏼&lt;/p&gt;




&lt;p&gt;Besides, if Onlykey wants to lend me an OnlyKey so that I can test it, I would be happy to try it in a future video. 🙏🏼&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter &lt;a href="https://wildnsecure.com/contact" rel="noopener noreferrer"&gt;on our website&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>hacker</category>
      <category>cyberattack</category>
    </item>
    <item>
      <title>9 Key Points about Passwords</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Mon, 15 Mar 2021 13:33:52 +0000</pubDate>
      <link>https://forem.com/shostarsson/9-key-points-about-passwords-563l</link>
      <guid>https://forem.com/shostarsson/9-key-points-about-passwords-563l</guid>
      <description>&lt;p&gt;Passwords!!! It's the Holy Grail of computer security. 🙈&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/__z2IZ3v5Tk"&gt;
&lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;Everyone would like to get rid of it. 🚮&lt;br&gt;
Everyone always has a revolutionary idea to do without it. 💡&lt;br&gt;
But, when we look at the facts, we are still forced to use them on a daily basis. 👨🏼‍💻&lt;/p&gt;

&lt;p&gt;That's why, it's important to follow some best practices, as passwords and credentials theft are a national sport among hackers. 🤺&lt;br&gt;
However, a human being does not have a brain designed to remember tens (hundreds 🤔) of complicated passwords with upper and lower case letters, numbers and special characters.&lt;/p&gt;

&lt;p&gt;Also, many problems occur due to little human error.&lt;br&gt;
In the computer world, it is often said that the problem lies between the chair and the keyboard. 😄&lt;/p&gt;

&lt;p&gt;In this video, I go back in detail, with key examples, to the essential points that allow you to avoid making stupid mistakes that could threaten your digital security.&lt;/p&gt;

&lt;p&gt;Feel free to tell me in the comments if you have any other points that you use to protect yourself.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter &lt;a href="https://wildnsecure.com/contact" rel="noopener noreferrer"&gt;on our website&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>hacking</category>
      <category>pentest</category>
    </item>
    <item>
      <title>The 14 Financial Impacts of a Cyber Attack 💸</title>
      <dc:creator>Rémi Lavedrine</dc:creator>
      <pubDate>Wed, 10 Mar 2021 14:48:47 +0000</pubDate>
      <link>https://forem.com/shostarsson/the-14-financial-impacts-of-a-cyber-attack-39a4</link>
      <guid>https://forem.com/shostarsson/the-14-financial-impacts-of-a-cyber-attack-39a4</guid>
      <description>&lt;p&gt;Cyber ​​attacks are on the increase and can affect businesses, administrations, hospitals or individuals. Prevention and training is the key to guarding against these attacks&lt;/p&gt;

&lt;p&gt;We quickly tend to think that the cost of a computer attack is limited to securing post-incident customer data, investigating the source of the incident and improving security measures so that it does not happen again. not. 🤞🏼&lt;/p&gt;

&lt;p&gt;The reality is quite different and the costs are actually going to be much higher. There are many things to do in the event of an attack. 🖐🏼&lt;/p&gt;

&lt;p&gt;In particular, it has the costs associated with crisis management, as we have seen in very, very large computer attacks.&lt;/p&gt;

&lt;p&gt;One can think in particular of the data leak which had taken place on the adulterous dating site in the United States Ashley Madison. 💔&lt;/p&gt;




&lt;p&gt;In this video, I walk through all of these financial impacts in detail.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/tcdKOmAvt-E"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;Video with French Audio &amp;amp; English Subtitles&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Video supported by &lt;a href="https://www.wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;If you're more in the Reading, here is the Infography I am going through in the video.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tgstzz6e7wyx5w927pl.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tgstzz6e7wyx5w927pl.jpeg" alt="The 14 Financial Impacts of a Cyber ​​Attack" width="800" height="781"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;If you like this content, push the like button, that helps spread the message.&lt;/em&gt; 👍🏼&lt;br&gt;
&lt;em&gt;If you think it can be useful to anyone in your network, share it.&lt;/em&gt; 📨&lt;/p&gt;




&lt;p&gt;Video produced by &lt;a href="https://wildnsecure.com" rel="noopener noreferrer"&gt;Wild &amp;amp; Secure&lt;/a&gt;, your consulting firm to all things security and real estate.&lt;br&gt;
If you want to receive weekly quality content about security, subscribe to our newsletter &lt;a href="https://wildnsecure.com/contact" rel="noopener noreferrer"&gt;on our website&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
  </channel>
</rss>
