
Using Have I Been Pwned to see if your email address has been breached? Most of us have more than one email address which can […] Read More
That's how they'll find me one day…
Using Have I Been Pwned to see if your email address has been breached? Most of us have more than one email address which can […] Read More
There is a lot of blame to go around in the aftermath of the Dyn DDoS attack on Oct 21st. A good chunk of the […] Read More
1The “Internet of Things”, or IoT, refers to the ever expanding offerings of traditionally non-Internet connected things that can now be connected to the Internet. […] Read More
I’m the least mathey person I know. My bio will attest to that – my skills are terrible but my curiousity is high. There’s a […] Read More
Probably the most significant decision people will make when building their website is the decision about what software to use. A lot of people choose […] Read More
I was thinking about port knocking the other day (yep, that’s how I roll) and while I consider it to be a valid security layer, […] Read More
Curl is one of those quintessential *nix tools that adheres beautifully to the “one tool, one task” philosophy. curl exists to give us the ability […] Read More
Brute force hacking is the easiest, least effective, and messiest method of all the ways to attempt to gain access to a system. It leaves […] Read More
This is my first post with Ghost and since it contains code snippets and command line goodies I thought it would be a good test […] Read More
I was assigned a Fidonet node number tonight. That will mean almost nothing to anyone, but to me it’s an accomplishment. It took me 3 […] Read More