There's currently a major backlash in the InfoSec community against so-called "smart" locks. And it's not just by people who naturally overreact to | Continue reading
8/10 My One-Sentence Summary Content Extraction Takeaways My book summaries are designed as captures for what I've read, and aren't necessarily great | Continue reading
Anyone who's been in business for a while has had the conversation about measuring performance. The topic makes some people radiate with joy and gives | Continue reading
A guided introduction to Vim that teaches concepts rather than syntax, so this can be the last time you have to learn it. | Continue reading
This is a simple explanation of the difference between a URI, a URN, and a URL—with a visual to assist the understanding. | Continue reading
How the inevitable goal of novel and interesting professions is ironically to become boring, like accounting or banking. | Continue reading
I don't agree with all of it. But this is a very good response to my remarks about encryption. https://t.co/rMl8zgtuWN@danielmiessler— Sam | Continue reading
If you're a programmer, a systems administrator, or really any type of IT worker, you probably have your favorite go-to IP addresses for troubleshooting. | Continue reading
I’ve had a sense of foreboding for the last month or so about the mental health of the United States. And sure—the Trump situation is raising pulses, but | Continue reading
If you're like me, you care if your website goes down. There have been services available for years that monitor your site and let you know if it goes | Continue reading
I'm a life-long Bay Area resident---born and raised---and I'm starting to see transformations in various communities that are setting off my dystopian | Continue reading
I've mentioned this in numerous places for the last few years, so I decided it was time to finally put it into a formal piece. It seems obvious at this | Continue reading
Starting around October 1st I saw something catastrophic happen to my incoming traffic from Google. Compared to the beginning of the year I have gone from | Continue reading
Practical tcpdump examples that gives you maximum packet carving in the minimum amount of time. Includes numerous examples and explanations ranging from basic to advanced—including how to isolate hosts, networks, and specific protocols. | Continue reading
There are tons of VPN options out there, and the field is confusing enough that I did a post on the topic a while back to help people pick one of the | Continue reading
There are tons of VPN options out there, and the field is confusing enough that I did a post on the topic a while back to help people pick one of the | Continue reading
There are tons of VPN options out there, and the field is confusing enough that I did a post on the topic a while back to help people pick one of the | Continue reading
You might have used Google's new AMP project without even knowing. It's a technology that makes mobile page results load very quickly on Google, it | Continue reading
I just stumbled upon an article by Mark R. Heckman, Ph.D, CISSP, CISA that---like so many others in the industry---wildly contorts himself to make a | Continue reading
Using ifconfig Using ip and netplan The ip command is replacing the ifconfig command. People often forget the process for assigning a static IP address | Continue reading
If you've spent any time coding in InfoSec, you've probably used a ton of curl to pull websites, check them for various issues or attributes, etc. This | Continue reading
> Books are a uniquely portable magic.Stephen King The more I read the more I find it difficult to talk to people who don't. I am aware of how bad that | Continue reading
For anyone who's been worried that their online fingerprint was going to be used against them, this paper will provide them their vindication. Here's how | Continue reading
I have been drawn to questions of happiness and fulfillment for much of my adult life. I'm not sure the reason for that, but I think it's a combination of | Continue reading
There are myriad theories as to why software remains insecure after we've spend decades trying to solve the problem. Some say it's the lack of will to secure things, the lack of vendor liability, the insecure languages we use, insufficient developer training, not enough security … | Continue reading
This is one of my most ambitious projects, as it aims to capture everything I learn through books, film, education, life experience, contemplation, etc. into a single place, and to present it as a concise nugget of interestingness. Eventually the goal is to then link those pieces … | Continue reading
In this Security Report Analysis (SRA) series I look at various security reports and pull out the main points. This doesn't replace a complete and detailed read of these reports, but it exposes you to some of the key takeaways that you might not otherwise have seen. REPORT: The 2 … | Continue reading
We in the West are in the beginning---or perhaps the middle of---a catestrophic crisis of meaning. Many of us sense it. We know it's happening. But it's hard to corner and identify. And it's even more difficult when authors like Steven Pinker use all of their intellectual powers … | Continue reading