Skip to content

Slumped Over Keyboard Dead

That's how they'll find me one day…

  • About Jon Watson

Tag: hacking

Whale breaching
Technology / Posted on December 11, 2016December 11, 2016

Quick n’ dirty loop to check breaches against Have I Been Pwned API

Using Have I Been Pwned to see if your email address has been breached? Most of us have more than one email address which can […] Read More

Continents using 1 and 0 signifying Mirai botnet
Featured, Technology / Posted on October 23, 2016December 3, 2017

Mirai botnets: the vanishing upper limit of DDoS attacks.

There is a lot of blame to go around in the aftermath of the Dyn DDoS attack on Oct 21st. A good chunk of the […] Read More

CCTV on a wall
Technology / Posted on August 11, 2016December 3, 2017

The problem with the Internet of Things is the things

1The “Internet of Things”, or IoT, refers to the ever expanding offerings of traditionally non-Internet connected things that can now be connected to the Internet. […] Read More

Technology / Posted on June 24, 2016December 3, 2017

Defeating keyless entry front door locks.

I’m the least mathey person I know. My bio will attest to that – my skills are terrible but my curiousity is high. There’s a […] Read More

Technology / Posted on June 1, 2016March 22, 2018

The fruit decision: how low should your website hang?

Probably the most significant decision people will make when building their website is the decision about what software to use. A lot of people choose […] Read More

Featured, Technology / Posted on February 17, 2016December 3, 2017

Defeating poor port knocking configurations

I was thinking about port knocking the other day (yep, that’s how I roll) and while I consider it to be a valid security layer, […] Read More

Technology / Posted on February 7, 2016October 23, 2016

Fun with Curl

Curl is one of those quintessential *nix tools that adheres beautifully to the “one tool, one task” philosophy. curl exists to give us the ability […] Read More

Technology / Posted on November 3, 2015October 23, 2016

What does brute force SSH hacking look like?

Brute force hacking is the easiest, least effective, and messiest method of all the ways to attempt to gain access to a system. It leaves […] Read More

Technology / Posted on October 30, 2015October 23, 2016

Looking for hacking activity in Apache Logs

This is my first post with Ghost and since it contains code snippets and command line goodies I thought it would be a good test […] Read More

Technology / Posted on September 28, 2015October 23, 2016

I am 1:249/207 Hear me Bark!

I was assigned a Fidonet node number tonight. That will mean almost nothing to anyone, but to me it’s an accomplishment. It took me 3 […] Read More

Posts navigation

Older posts

Interesting stuff on the interwebs

Das System

IDrive Remote Backup

Series: My website is down. Now what?

This is a multi-part series about how to keep your cool when your website is down and be part of the solution instead of a seething mass of non-helpfulness.

Part 1: Overview
Part 2: DNS Issues
Part 3: Routing
Part 4: Layers (firewalls, etc.)
Part 5: SSL/ TLS and HTTPS problems

Tags

android apache apps awk bbs biology bitcoin blog c++ chromebook chromeos cms cryptography culture dns email evolution fidonet hacking humour internet iot joomla keys linux logic logs malware passwords pebble pki pontification science security splunk ssh ssl sysadmin technology troubleshooting wearable web website wordpress work

Archives

  • March 2018
  • February 2018
  • January 2018
  • October 2017
  • December 2016
  • November 2016
  • October 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • April 2015
  • January 2015
  • September 2014
  • November 2013
  • August 2013
  • February 2013
© 2018 Slumped Over Keyboard Dead
Powered by WordPress / Theme by Design Lab