Since 1997, people on and off the internet mostly know me as “e-sushi”. I am a well-vetted cross-platform software development expert, an experienced cybersecurity specialist, as well as a seasoned graphic design professional who embraces visual communications across all media.
During the past three decades, I served the military of two different countries, helped startups evolve into full-blown businesses, enhanced the information security of major corporations and institutions, and have been featured in a multitude of books and magazines around the globe.
I am always open to talk about project cooperation or maybe even interesting job offers, so don’t hesitate to get in touch whenever you think it makes sense…
security [at] e-sushi.net
Quick, easy, and completely configurable recycle bin e-sushi for your Microsoft Windows system tray area.
Eject your disk(s) with ease using this tiny software e-sushi for Microsoft Windows operating systems.
Hosts file by e-sushi (Last Modified and Verified: 2019-02-19) which can be used to block advertisements, webfont services, and alike annoyances on both mobile as well as non-mobile devices. Permanent URL = https://e-sushi.net/public/hosts.txt
In 2009, some of my (meanwhile unavailable) infosec software became part of the story in a book called “F0rb1dd3n ~The Story is F1ct10n The threats are real” by Jayson E. Street. (screenshot of related credits)
From June 30, 2015 up until December 18, 2018 I invested a significant amount of my spare time working as a pro bono moderator at the Cryptography.StackExchange website.
Every now and then, my two cents get mentioned in articles like “How To Deal With A Hacker Finding Holes In Your Security”.
The website, and all data and services available via this website, are provided “as is” and for “use at own risk”. The author disclaims all warranties with regard to this website and all data and services available via this website including all implied warranties of merchantability and fitness.
In no event shall the author be liable for any special, direct, indirect, or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of this website, or any data or service available via this website.
This website uses access logs to ensure network integrity and system security. Collected information includes: timestamp, internet protocol address, user agent string, requested URL, referring URL, and resulting HTTP code. Access log data will not be shared with any 3rd party outside the hosting company, unless explicitly required by law or court order. To protect your privacy, access log data is destroyed within 24 hours after processing.
In case you would like to report a potential security issue related to this website, you can use the infos contained in security.txt and we’ll take it from there.