Apr 04, 2025Ravie LakshmananCritical Infrastructure / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that no less…
Ever wonder what mail servers the top U.S. companies run? I found myself wondering what the top universities used a…
Here’s a snip from a forum question that I’m getting ready to write a little piece on. My response is…
Here’s a look at the most interesting products from the past week, featuring releases from 1touch.io, Bitsight, Bluefin, CyberQP, and…
[ August 2006 ] I’ve been playing with Linux since 1999 and using it steadily in one capacity or another…
[ Aug 2, 2006 ] If you’re an information security administrator/analyst with average skills and little interest in the field,…
Australian superannuation funds have been hit by attackers using stolen credentials to access members’ accounts. AustralianSuper said that “up to…
There is a bit of a debate in some circles about using xargs vs. the -exec {} option that’s built…
[ July 27, 2006 ] A long time ago (a couple of years) I considered going to market with a…
I’ve been thinking lately about how I can improve myself, or, more accurately, what the barriers are to my growing…
This is one of my most ambitious projects, as it aims to capture everything I learn through books, film, education,…
Someone’s noticed a very interesting fact about firewall filtering that relies on session sniping, i.e. killing connections with RST packets….











