Tunnel Security Analysis
Security Analysis: Tunneling + Docker Nginx Proxyfrom Home/Office NetworkPrepared for: Dr. Mohd Hanif Mohd Ramli — Eagle Attech / TXIO Fusion SolutionsDate: March 2026Scope: Apps hosted via tunneling (e.g., Cloudflare Tunnel / SSH tunnel / ngrok) throughDocker nginx reverse…
Mar 27, 20268 min read
Secure File Transfer &
A Plain-Language Guide to SSH, SCP, and rsync
Mar 27, 20265 min read
SSH Key Migration Guide
When upgrading to a new Mac laptop, your SSH access to remote servers depends on your private key, not the machine itself. The servers already have your public key in their authorized_keys file. To regain access from a new machine, you need to transfer your entire SSH key pair…
Mar 27, 20265 min read
CYBERSECURITY AWARENESS
Your public IP address is typically your router’s WAN address, not your phone’s direct address. Knowing someone’s IP alone provides limited attack capability, but it is still worth understanding the risks.
Mar 27, 20267 min read
Docker Hardened Orchestration
Eagle Attech Sdn Bhd / TXIO Fusion Solutions
Mar 27, 20267 min read
HTTP Traffic Monitoring
Framework-Agnostic Network Tapping Techniques
Mar 10, 20265 min read
CYBER AWARENESS
For discussion and awareness among friends and colleagues
Mar 1, 20267 min read