Send a message to
Emeric Nasi

I am a French Security researcher. I worked as a developer for couple of years and then decided to create the Sevagas information Security blog in 2009 during a 35000 km (9 months) trip all around Australia :-). The goal was to publish tutorials, articles, and tools.

I founded in 2016 SEVAGAS Information Security to offer to my customers the results of my researches and experience in cybersecurity.

My previous assignments were to work as CyberSecurity Expert and Business coordinator and earlier security architect in energy field (SCADA and control systems). I also worked as consultant on subjects like code auditing, payment applications and PCI-DSS environment.

Contact
You can find news about the Sevagas website and myself on my twitter account .
My professional resume is available on my linkedin account.
You can contact me using the form below. If you need to contact me in a more confidential way, you can use this gpg iconGPG key or you can use ProtonMail and send a message to ena.sevagas[ at ]protonmail.com

Note: I am using my public identity on this blog, I and honest with you and expect the same in return. I will generally not answer to emails if I cannot link the senders to a real identity, especially if they concern exploit or malware writing.


Send a message

This author wrote:
Using PAM modules to create a restricted group in order to "jail" or "limit" some users (mostly system users).
Article published on 27 August 2010
How-to simply and securely manage the various users and system accounts on a Linux box.
Article published on 14 August 2010
Use POSIX file capabilities and PHP to create a backdoor that opens a root back-channel to the attacker’s PC on port TCP 53 when a PHP page is called with a special url.
Article published on 18 June 2010
How to create an automatic update task for various GNU Linux distributions. This script should be run daily or weekly. If you use a restrictive iptables firewall, the script should open the (...)
Article published on 17 June 2010
All security guides recommend you should have a recovery toolkit constituted of static linked important binaries. In this article I will show how to build this toolkit.
Article published on 10 June 2010