Since 1997, people on and off the internet mostly know me as “e-sushi”. I am a well-vetted cross-platform software development expert, an experienced information security specialist, as well as a seasoned graphic design professional who embraces visual communications across all media.
During the past three decades, I served the military of two different countries, helped startups evolve into full-blown businesses, enhanced the information security of major corporations and institutions, and have been featured in a multitude of books and magazines around the globe.
In my spare time, I fiddle with diverse sourcecode and dabble in the realms of information security and cyber defense. This includes my cryptography and cryptanalysis related Q&A contributions to Cryptography.StackExchange, which have reached well over half a million people up until today.
Sent to: email@example.com
If you’ld like to show some support, you can buy me a coffee and some donuts…
Sent to: 1LP9vvifY3zF1DJSCtugFfnhp4brmsushi
minibin by e-sushi
Quick, easy, and completely configurable recycle bin for your Microsoft Windows system tray area.
diskeject by e-sushi
Eject your disk(s) with easy using this tiny software for Microsoft Windows operating systems.
enlighten by e-sushi
Light up the darkness with this minimal app for Google Android.
tea-time by e-sushi
This little, free terminal program by e-sushi is a /dev/urandom for tinfoil hatters that run Linux.
music by e-sushi
Here’s a small collection of 26 MP3 tracks featuring some of the electronic music productions which I have been producing over the years.
Please read the following legal information carefully.
The website, and all data and services available via this website, are provided “as is” and for “use at own risk”. The author disclaims all warranties with regard to this website and all data and services available via this website including all implied warranties of merchantability and fitness.
In no event shall the author be liable for any special, direct, indirect, or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of this website, or any data or service available via this website.
This website uses access logs to ensure network integrity and system security. Collected information includes: timestamp, internet protocol address, user agent string, requested URL, referring URL, and resulting HTTP code. Access log data will not be shared with any 3rd party outside the hosting company, unless explicitly required by law or court order. To protect your privacy, access log data is destroyed within 24 hours after processing.
The website does not use or set any digital cookies.