Category: Mix

On the Cisco / Brock Lesnar Analogy
12
Apr
2025

On the Cisco / Brock Lesnar Analogy

So a fellow infosec buddy of mine, Hoff, wrote a great piece about how Brock Lesnar is like Cisco. His…

Using Twitter Search to Find Interesting People to Follow
12
Apr
2025

Using Twitter Search to Find Interesting People to Follow

So everyone knows by now that Twitter is getting big. Really big. One of the most important things to figure…

The Pope is Evil | Daniel Miessler
12
Apr
2025

The Pope is Evil | Daniel Miessler

As George Bush hopefully taught us, it doesn’t matter if you think you’re doing good when you commit acts that…

The Problem With Selling Information Security as a “Business Enabler”
12
Apr
2025

The Problem With Selling Information Security as a “Business Enabler”

A random, innocent tweet by Gunnar Peterson (@oneraindrop) got me emoting about whether or not Information Security should be viewed/pitched…

The Steam, Water, and Ice of Modern Communication
12
Apr
2025

The Steam, Water, and Ice of Modern Communication

A friend recently forwarded me an email I sent to him in 2004. It was part of conversation about where…

The Real Reason Git is Great
12
Apr
2025

The Real Reason Git is Great

This is the best argument I’ve come across for why git is special and worth your time. I’ve seen glimpses…

Two Great Videos for Your Creationist Friends
12
Apr
2025

Two Great Videos for Your Creationist Friends

This is one of the best refutations of the standard creationist arguments I’ve seen in a short video format. Combined…

Character Encoding: Which Schemes Encode to Which Sizes?
12
Apr
2025

Character Encoding: Which Schemes Encode to Which Sizes?

The subject of character mapping and encoding is formidable, and many confuse the various schemes and standards available. As a…

Her Name is Susan | Daniel Miessler
12
Apr
2025

Her Name is Susan | Daniel Miessler

I lack the words, but I don’t need them. I sometimes realize that I’m hesitant to talk about my love…

The VIA Model of Security Filtering Technologies
12
Apr
2025

The VIA Model of Security Filtering Technologies

I inwardly smile when I hear the term “Unified Threat Management”. It means different things to different people, but to…

Misconceptions about Unicode and UTF-8/16/32
12
Apr
2025

Misconceptions about Unicode and UTF-8/16/32

So everyone knows that UTF-8 encodes Unicode code points into eight bits, and UTF-16 encodes Unicode code points into 16…

Some Thoughts on the Economic Viability of E-Books
12
Apr
2025

Some Thoughts on the Economic Viability of E-Books

A friend of mine (I’ll identify him if he so desires) sent me the following email: I think this is…