How I Organize My iPhone Applications
It can be frustrating to not have a system for your iPhone app organization–especially if you’re an optimization freak like me. Here’s how I do…
It can be frustrating to not have a system for your iPhone app organization–especially if you’re an optimization freak like me. Here’s how I do…
This is me in 87′ executing a handplant. For anyone interested, that’s a John Lucero board with a super short tail. The board was stolen…
A while back during a pentest my buddy Steve came up with a cool idea for doing Nmap scans while a client is expected to…
Aussie Broadband has outlined a six-pillar technology strategy aimed at making IT more trusted and able to underpin an ambitious growth plan over the next…
How much of the way you live your life is because of the environment you live in as opposed to being true manifestations of your…
I hate forgetting things. Here are a few GPG commands for doing the basics from the command line. Examples See what version you’re at: gpg…
Meta has disclosed a critical security vulnerability in WhatsApp for Windows—tracked as CVE-2025-30401—which could allow remote attackers to execute arbitrary code on victim systems. The…
ASX-listed Orica has changed the cloud ecosystem it uses to host its SAP environment from Azure to Google Cloud, chasing performance improvements, cost savings and…
Ever watched a really cool video on YouTube only to find out it’s gone when you go to show it to someone? Well, here’s how…
Victoria University (VU) has hired former PEXA information security management head Tara Dharnikota to fill its long-vacant chief information security officer role. The university has been looking…
Gladwell’s new book, Outliers: The Story of Success is phenomenal. It covers something I’ve been thinking about for years: the algorithm for success. It’s a…
A new variant of the fake NextGen mParivahan app has emerged, exploiting the trust users place in official government notifications to distribute malware. This malicious…