The Simple, Effective Way to Track What’s Said About You on the Internet
So everyone knows by now that Twitter is getting big. Really big. One of the most important things to figure …
Read MoreEver Wondered How “Fyodor” (Nmap) Got His Name?
A friend recently forwarded me an email I sent to him in 2004. It was part of conversation about where …
Read MoreA Summary of New Nmap Features from Blackhat/DEFCON 2008
A random, innocent tweet by Gunnar Peterson (@oneraindrop) got me emoting about whether or not Information Security should be viewed/pitched …
Read More10 Things Everyone Should Know About the Middle East
As George Bush hopefully taught us, it doesn’t matter if you think you’re doing good when you commit acts that …
Read MoreTake From Me and Give to Him: A New Perspective on Prayer
Christians love to rail against hateful language in the Koran, saying that the extremist teachings there can be used to …
Read MoreIndulgence as God
So a fellow infosec buddy of mine, Hoff, wrote a great piece about how Brock Lesnar is like Cisco. His …
Read MoreHow to Include WordPress Components in Your Custom Web Pages
I took the serious risk of correcting a friend today (privately, via Twitter DM) in regard to his use of …
Read MoreEnd of an Era: It’s Time to Stop Making Fun of Microsoft Security
This is one of the best refutations of the standard creationist arguments I’ve seen in a short video format. Combined …
Read MoreWhy I Carry A Gun: A Personal Anecdote
I inwardly smile when I hear the term “Unified Threat Management”. It means different things to different people, but to …
Read MoreThe Baader-Meinhof Phenomenon
This is the best argument I’ve come across for why git is special and worth your time. I’ve seen glimpses …
Read More












Recent Comments