Category: Mix

19
Jul
2025

Why You Should Dump Internet Explorer

The time has come to dump Internet Explorer. I know, I know — you may have heard the same thing…

19
Jul
2025

Diffie-Hellman

Diffie-Hellman is a key exchange protocol developed by Diffie and Hellman (imagine that) in 1976. The purpose of Diffie-Hellman is…

19
Jul
2025

An IPTABLES Primer

iptables is the packet filtering technology that’s built into the 2.4 Linux kernel. It’s what allows one to do firewalling,…

19
Jul
2025

Geek Battles: A Call for Perspective

“Linux sucks as a desktop.” “Windows is insecure.” “OS X is for rich, trendy art majors.” Depending on who’s in…

19
Jul
2025

Why You Should Dump Internet Explorer

The time has come to dump Internet Explorer. I know, I know — you may have heard the same thing…

19
Jul
2025

Diffie-Hellman

Diffie-Hellman is a key exchange protocol developed by Diffie and Hellman (imagine that) in 1976. The purpose of Diffie-Hellman is…

19
Jul
2025

Geek Battles: A Call for Perspective

“Linux sucks as a desktop.” “Windows is insecure.” “OS X is for rich, trendy art majors.” Depending on who’s in…

19
Jul
2025

Is Pre Big-Bang Agnosticism a Belief?

I’ve been having a conversation with a friend about whether atheism and agnosticism is a belief. First off, let’s synchronize….

19
Jul
2025

Is Pre Big-Bang Agnosticism a Belief?

I’ve been having a conversation with a friend about whether atheism and agnosticism is a belief. First off, let’s synchronize….

19
Jul
2025

Neovim Line Manipulation: Copy and Move Like a Pro

Neovim command sequences visualization (click for full size) After returning to Neovim recently, I’ve discovered some powerful techniques for manipulating…

19
Jul
2025

Fixing Opencode Transparency in Ghostty Terminal

How to make Opencode respect your terminal’s transparent background July 18, 2025 Opencode running with transparent background in Ghostty (click…

[tl;dr sec] #288 - Prompt Injection in Malware, Preventative Security, Top Bug Bounty War Stories
17
Jul
2025

[tl;dr sec] #288 – Prompt Injection in Malware, Preventative Security, Top Bug Bounty War Stories

Checkpoint finds malware containing prompt injection, why preventative security is hard, @Rhynorater talk sharing 11 of his most impactful and…