Burp Intruder Payload Methods Explained
If you use Burp a good bit you’ve likely run into the question of what precisely the various Intruder Payload Methods do. Specifically, what are…
If you use Burp a good bit you’ve likely run into the question of what precisely the various Intruder Payload Methods do. Specifically, what are…
I think there are two primary levels of awareness possible for modern humans. There are those who don’t think about why they want what they…
I recently decided to give Xobni for GMail a try. It does some wicked integration between your Google contacts, Facebook, LinkedIn, etc. Basically, the idea…
I am often asked how I handle handle security while using social networks. This post serves as my answer in image and bullet form. I…
I was just struck this morning with a realization about Sam Harris’s latest book: The Moral Landscape. I’m browsing through portions of it again after…
Today I learned (from Scott Adams’ blog) that Donald Trump, during his last presidential run, proposed that we pay the national debt off all at…
I saw the most extraordinary thing yesterday during lunch. It was a CNN piece on a Libyan man who was fighting against Ghaddafi’s forces. He…
We’ve heard a thousand such analogies, and they generally suck. Perhaps this one will suck slightly less. Getting right to it, the iPhone experience is…
I’ve been stupid for Astaro since the early 00’s and I remain so today. Today I run it in a virtual machine on an ESXi…
It’s highly annoying when you are trying to read or download something at a client site only to be denied by their proxy. Luckily there’s…
Many believe the discussion of free will is pointless. This is usually because one believes it’s been settled (for the religious who believe God gave…
Many are confused by the terms decompiler and disassembler. As with most confusion of this type, most just use the words interchangeably. Don’t do that;…