Anything Worth Saying is Worth Owning
I’ve been coming repeatedly to a simple conclusion regarding content creation and the use of social services: If something is worth creating, it’s worth keeping…
I’ve been coming repeatedly to a simple conclusion regarding content creation and the use of social services: If something is worth creating, it’s worth keeping…
Many are confused about the meaning of agnosticism as it relates to things we as humans are not certain about. The common mistake is combining…
Microsoft has warned organizations worldwide that threat actors are ramping up their exploitation of critical vulnerabilities in on-premises Exchange Server and SharePoint Server. These attacks,…
From StackOverflow: You mention cutting with yy and complain that you almost never want to cut whole lines. In fact programmers, editing source code, very…
At BSides-LasVegas this year I saw an exemplary talk on the history of lock technology and lock picking. Not only was it informative, but it…
One of the most commonly held debates between non-believers is that of whether someone is agnostic or atheist. The problem is that both terms have,…
The horse is dead. Design, feel, features, openness, customizability — we’ve heard it all. The main arguments are well understood by anyone with an interest…
My web configuration makes use of Varnish as a front-end, and I noticed a bug recently where asking for “/study” was failing, while asking for…
Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated persistence techniques to maintain long-term access within targeted environments. These…
I spent yesterday on the front page of Hacker News for my git primer, which resulted in over 12K page views and some fascinating insight…
In today’s rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge: efficiently managing and prioritizing the overwhelming volume of security alerts…
DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System protocol to exfiltrate data and…