Send a message to
Emeric Nasi

I am a French Security researcher. I worked as a developer for couple of years and then decided to create the Sevagas information Security blog in 2009 during a 35000 km (9 months) trip all around Australia :-). The goal was to publish tutorials, articles, and tools.

I founded in 2016 SEVAGAS Information Security to offer to my customers the results of my researches and experience in cybersecurity.

My previous assignments were to work as CyberSecurity Expert and Business coordinator and earlier security architect in energy field (SCADA and control systems). I also worked as consultant on subjects like code auditing, payment applications and PCI-DSS environment.

Contact
You can find news about the Sevagas website and myself on my twitter account .
My professional resume is available on my linkedin account.
You can contact me using the form below. If you need to contact me in a more confidential way, you can use this gpg iconGPG key or you can use ProtonMail and send a message to ena.sevagas[ at ]protonmail.com

Note: I am using my public identity on this blog, I and honest with you and expect the same in return. I will generally not answer to emails if I cannot link the senders to a real identity, especially if they concern exploit or malware writing.


Send a message

This author wrote:
Use the java.lang.reflect package to access and modify any field in Java objects, even when declared "private static final"
Article published on 13 January 2011
How-to configure the Tomcat securitymanager file to allow Spring and Hibernate on your java secure webapp.
Article published on 8 January 2011
Some useful commands that can be used by an admin to scan his filesystem for common threats and misconfiguration (SUID files, world writable files, bad ownership, file capabilities, etc).
Article published on 5 December 2010
To install (root privileges required): $ gzip -d Glyptodon_1-2-r2-tar.gz $ tar -xvf Glyptodon_1-2-r2-tar $ cd Glyptodon_1.2 Read README file $ ./install.sh ( for complete install) Download :
Article published on 28 November 2010
How-to simply and securely use hash methods in your java projects.
Article published on 10 November 2010