The Steam, Water, and Ice of Modern Communication
A friend recently forwarded me an email I sent to him in 2004. It was part of conversation about where...
Read more →A friend recently forwarded me an email I sent to him in 2004. It was part of conversation about where...
Read more →FortiGuard Labs, Fortinet’s AI-driven threat intelligence arm, has uncovered a series of malicious NPM packages designed to steal sensitive information...
Read more →Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute...
Read more →This is the best argument I’ve come across for why git is special and worth your time. I’ve seen glimpses...
Read more →Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites...
Read more →This is one of the best refutations of the standard creationist arguments I’ve seen in a short video format. Combined...
Read more →The subject of character mapping and encoding is formidable, and many confuse the various schemes and standards available. As a...
Read more →I lack the words, but I don’t need them. I sometimes realize that I’m hesitant to talk about my love...
Read more →I inwardly smile when I hear the term “Unified Threat Management”. It means different things to different people, but to...
Read more →So everyone knows that UTF-8 encodes Unicode code points into eight bits, and UTF-16 encodes Unicode code points into 16...
Read more →A friend of mine (I’ll identify him if he so desires) sent me the following email: I think this is...
Read more →The über-tech-geek culture has a problem with tool obsession. Twitter, Friendfeed, Google Reader–these are all basics, but each of these...
Read more →