Just Implemented Memcached | Daniel Miessler
So I just implemented memcached. It’s basically a system that uses hash tables to serve content directly from memory rather...
Read more →So I just implemented memcached. It’s basically a system that uses hash tables to serve content directly from memory rather...
Read more →Ever feel like phishing scams are on a never-ending quest for supreme deception? From fake delivery notifications to impersonated CEOs,...
Read more →MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and...
Read more →My buddies and I are doing a Harn campaign right now and one of the mechanics involves accruing stat “checks”...
Read more →A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware...
Read more →By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to...
Read more →Image from scientificamerican.com Scientists are now discovering that self-control is a precious, finite resource that can be raised and lowered...
Read more →I am an enthusiastic user of the Verisign PIP two-factor authentication service. It’s a system that allows you to add additional...
Read more →First, watch the talk. Believe me–it’s worth it. Now, I think the talk is brilliant, and I think he makes...
Read more →Google has issued an urgent security update for its Chrome browser after two critical vulnerabilities were discovered. These vulnerabilities could...
Read more →So perhaps you’ve heard the story of evil America trying to enact a draconian immigration policy towards Mexico. It’s the...
Read more →[ NOTE: This is an older configuration, and my latest can be found here. ] If you are into blogging...
Read more →