Articles by Richard Audette

Long form articles which don’t suit my blog

Recent articles

Feb 5, 2022
Introducing Eliza Ng, my generated content sandbox and blogging bot I created a blogging bot I’ve named Eliza Ng, as a sandbox for playing with generated content and tooling.
Feb 11, 2021
Should I get in this elevator? Could a $10 sensor inform my decision? After learning that indoor CO2 levels can be used as a risk proxy for Covid-19 transmission, I purchased an inexpensive sensor and started measuring CO2 levels in my environment.
Jan 2, 2021
Voice Assistant File Transfer Protocol: Encodes files verbally and transfer them through the Alexa voice assistant A proof of concept protocol, client application, server application, and Alexa Skill. The client encodes a binary file as english words, launches an Alexa Skill and verbally sends the data through the PC's speakers to an Amazon Echo device. The server decodes the words, saves the binary file, and makes it available on the Internet.
Dec 2, 2020
Protect Your Users from Credential Stuffing Attacks: Ensure they aren't using passwords known to be breached Prevent credential stuffing attacks on your website by building a service on AWS which you can use to determine if your users are using passwords which appear in Troy Hunt's ihavebeenpwned database of 600 million breached passwords.
Jan 4, 2020
Use Browser Automation to Monitor And Detect Magecart-style Web Skimming Attacks Detect a Magecart-style web skimming attack on a website by deploying a script which sends a notification if a browser loads resources from domains that has not been whitelisted.