2 SSH Brute-Force-Attack Countermeasures
I’ve had a nagging problem for some time where I couldn’t figure out quite how to ignore my wp-content/cache directory …
Read MoreI Wanted to Congratulate Malcolm Gladwell on His New Book, But Now That I’ve Read It I Know He Doesn’t Deserve Much of the Credit
I think I’ve made a decision to be more direct in my attacks against beliefs in the supernatural (including religion). …
Read MoreHow to Instantly Download Any YouTube Video in .mp4 Format
First, let’s state the obvious: you need a bit of ego to maintain a Twitter account. Not to experiment, but …
Read MoreHow to Flush Your DNS in OS X Leopard
People struggle with why Twitter is special. It’s special because it counters, better than any other technology, the timeless social …
Read MoreHow to Add Directory Colors to OS X’s Terminal
It’s getting exciting in the world of cross-network authentication. Let’s review. I can now: sign into Digg using Facebook sign …
Read MoreBasic GPG Commands
There are three fundamental ways of learning about the world, and they map well to concepts we’re all familiar with: …
Read MoreWhole Foods Elitism
One of the most common arguments from the religious is that without God there would be no morality. Non-believers reject …
Read MoreThe Ultimate Masculinity Test: A Laser Pointer
My buddy at work asked me if I could find some location information for a list of IPs. I knew …
Read MoreThe GIAC GSE: The Grandmaster of Information Security Certifications
There is no supernatural origin of free will. All human action is the product of the interaction of a finite …
Read MoreShould We Focus on Vulnerabilities or Threats?
Here’s an interesting question: what is your standard for deciding when to add a given person to these various services? …
Read More












Recent Comments