Cybersecurity

Digital security awareness and threat analysis

Tunnel Security Analysis

Security Analysis: Tunneling + Docker Nginx Proxyfrom Home/Office NetworkPrepared for: Dr. Mohd Hanif Mohd Ramli — Eagle Attech / TXIO Fusion SolutionsDate: March 2026Scope: Apps hosted via tunneling (e.g., Cloudflare Tunnel / SSH tunnel / ngrok) throughDocker nginx reverse…

Mar 27, 20268 min read

Secure File Transfer &

A Plain-Language Guide to SSH, SCP, and rsync

Mar 27, 20265 min read

SSH Key Migration Guide

When upgrading to a new Mac laptop, your SSH access to remote servers depends on your private key, not the machine itself. The servers already have your public key in their authorized_keys file. To regain access from a new machine, you need to transfer your entire SSH key pair…

Mar 27, 20265 min read

CYBERSECURITY AWARENESS

Your public IP address is typically your router’s WAN address, not your phone’s direct address. Knowing someone’s IP alone provides limited attack capability, but it is still worth understanding the risks.

Mar 27, 20267 min read

Docker Hardened Orchestration

Eagle Attech Sdn Bhd / TXIO Fusion Solutions

Mar 27, 20267 min read

HTTP Traffic Monitoring

Framework-Agnostic Network Tapping Techniques

Mar 10, 20265 min read

CYBER AWARENESS

For discussion and awareness among friends and colleagues

Mar 1, 20267 min read