In continuing with ongoing efforts to improve the site, I’ve modified the look of the lists in my sidebars. Among…
It can be frustrating to not have a system for your iPhone app organization–especially if you’re an optimization freak like…
This is me in 87′ executing a handplant. For anyone interested, that’s a John Lucero board with a super short…
A while back during a pentest my buddy Steve came up with a cool idea for doing Nmap scans while…
Aussie Broadband has outlined a six-pillar technology strategy aimed at making IT more trusted and able to underpin an ambitious…
How much of the way you live your life is because of the environment you live in as opposed to…
I hate forgetting things. Here are a few GPG commands for doing the basics from the command line. Examples See…
Meta has disclosed a critical security vulnerability in WhatsApp for Windows—tracked as CVE-2025-30401—which could allow remote attackers to execute arbitrary…
ASX-listed Orica has changed the cloud ecosystem it uses to host its SAP environment from Azure to Google Cloud, chasing…
Ever watched a really cool video on YouTube only to find out it’s gone when you go to show it…
Victoria University (VU) has hired former PEXA information security management head Tara Dharnikota to fill its long-vacant chief information security officer role….
Gladwell’s new book, Outliers: The Story of Success is phenomenal. It covers something I’ve been thinking about for years: the…











