Top
New
đŚ
danielrm26
joined 4/4/2007, 7:50 PM has 4,279 karma
POSTS
by
danielrm26
on 8/28/2025, 4:30 PM with
comments
by
danielrm26
on 8/18/2025, 6:39 PM with
comments
by
danielrm26
on 8/17/2025, 7:52 AM with
comments
by
danielrm26
on 8/17/2025, 12:13 AM with
comments
by
danielrm26
on 8/16/2025, 9:18 PM with
comments
by
danielrm26
on 8/16/2025, 1:35 AM with
comments
by
danielrm26
on 8/16/2025, 1:34 AM with
comments
by
danielrm26
on 8/12/2025, 8:35 PM with
comments
by
danielrm26
on 7/27/2025, 1:51 AM with
comments
by
danielrm26
on 7/25/2025, 6:01 PM with
comments
by
danielrm26
on 5/30/2025, 1:59 PM with
comments
by
danielrm26
on 4/4/2025, 8:45 PM with
comments
A CLI tool for security testing agent workflows
by
danielrm26
on 3/10/2025, 3:56 PM with
0
comments
by
danielrm26
on 11/11/2024, 7:16 PM with
comments
by
danielrm26
on 7/2/2024, 7:36 PM with
comments
Framing Is Everything
by
danielrm26
on 2/25/2024, 6:36 AM with
0
comments
by
danielrm26
on 2/9/2024, 4:55 PM with
comments
by
danielrm26
on 11/17/2023, 5:43 PM with
comments
by
danielrm26
on 10/2/2023, 5:24 PM with
comments
by
danielrm26
on 8/7/2023, 4:41 PM with
comments
by
danielrm26
on 5/18/2023, 5:34 PM with
comments
by
danielrm26
on 3/13/2023, 12:35 AM with
comments
Bidenâs cybersecurity strategy requires tech regs, software liability reform
by
danielrm26
on 3/7/2023, 12:10 AM with
0
comments
Old Windows âMock Foldersâ UAC bypass used to drop malware
by
danielrm26
on 3/7/2023, 12:08 AM with
0
comments
by
danielrm26
on 2/23/2023, 5:35 PM with
comments
ChatGPT-style search represents a 10x cost increase for Google, Microsoft
by
danielrm26
on 2/22/2023, 8:37 PM with
0
comments
US arrests Russian crypto exchange owner for allegedly laundering over $700M
by
danielrm26
on 1/19/2023, 7:12 PM with
0
comments
Twitterâs data leak response is a lesson in how not to do cybersecurity
by
danielrm26
on 1/19/2023, 7:10 PM with
0
comments
FTXâs new CEO says thereâs possibility for exchange to restart
by
danielrm26
on 1/19/2023, 7:10 PM with
0
comments
by
danielrm26
on 1/2/2023, 8:40 PM with
comments
Google is letting businesses try out client-side encryption for Gmail
by
danielrm26
on 12/19/2022, 4:38 PM with
0
comments
FTC brings record $520M children's privacy settlement against Epic Games
by
danielrm26
on 12/19/2022, 4:36 PM with
0
comments
by
danielrm26
on 12/8/2022, 5:09 PM with
comments
US Congress rolls back proposal to restrict use of Chinese chips
by
danielrm26
on 12/8/2022, 5:07 PM with
0
comments
Apple finally adds encryption to iCloud backups
by
danielrm26
on 12/8/2022, 5:07 PM with
0
comments
by
danielrm26
on 12/6/2022, 5:07 PM with
comments
by
danielrm26
on 12/6/2022, 5:05 PM with
comments
by
danielrm26
on 12/6/2022, 5:04 PM with
comments
by
danielrm26
on 12/5/2022, 4:43 PM with
comments
The Splintered Mind: GPT-3 Can Talk Like the Philosopher Daniel Dennett
by
danielrm26
on 11/7/2022, 6:57 PM with
0
comments
The Immutable Laws of Security
by
danielrm26
on 11/7/2022, 6:56 PM with
0
comments
by
danielrm26
on 10/17/2022, 4:03 PM with
comments
by
danielrm26
on 7/18/2022, 6:22 PM with
comments
by
danielrm26
on 4/15/2022, 4:59 PM with
comments
Public Redis exploit used by malware gang to grow botnet
by
danielrm26
on 3/25/2022, 7:07 PM with
0
comments
Estonian ransomware operator sentenced to 66 months in prison
by
danielrm26
on 3/25/2022, 7:06 PM with
0
comments
Dual North Korean hacking efforts found attacking Google Chrome vulnerability
by
danielrm26
on 3/25/2022, 7:05 PM with
0
comments
by
danielrm26
on 3/23/2022, 3:43 PM with
comments
Workers are trading staggering amounts of data for 'payday loans'
by
danielrm26
on 3/23/2022, 3:41 PM with
0
comments
Ten notorious ransomware strains put to the encryption speed test
by
danielrm26
on 3/23/2022, 3:38 PM with
0
comments
Custom macOS malware of Chinese hackers 'Storm Cloud' exposed
by
danielrm26
on 3/23/2022, 2:59 AM with
0
comments
White House shares checklist to counter Russian cyberattacks
by
danielrm26
on 3/23/2022, 2:58 AM with
0
comments
Venezuelan leftists took to Twitter attempting to swing Colombian election
by
danielrm26
on 3/21/2022, 3:40 PM with
1
comments
Microsoft investigating claims of hacked source code repositories
by
danielrm26
on 3/21/2022, 3:37 PM with
0
comments
by
danielrm26
on 3/19/2022, 6:19 PM with
comments
DarkHotel hacking campaign targets luxury Macao resorts
by
danielrm26
on 3/18/2022, 5:45 PM with
0
comments
Google: Chinese state hackers target Ukraine's government
by
danielrm26
on 3/18/2022, 5:31 PM with
0
comments
South Africa credit bureau breached, data reportedly held for $15M ransom
by
danielrm26
on 3/18/2022, 5:29 PM with
0
comments
Australia launches program to curb stalkerware
by
danielrm26
on 3/18/2022, 5:26 PM with
0
comments
by
danielrm26
on 3/16/2022, 4:02 PM with
comments
by
danielrm26
on 2/12/2022, 4:27 PM with
comments
Log4j â Getting to 2.16 and 2.17 is only Critical For Non-Default Configurations
by
danielrm26
on 12/19/2021, 5:57 PM with
comments
If You're Not Doing Continuous Asset Management You're Not Doing Security
by
danielrm26
on 12/17/2021, 10:01 PM with
comments
NFTs Are Digital Signaling
by
danielrm26
on 12/5/2021, 6:56 PM with
comments
Thoughts on Facebook Meta
by
danielrm26
on 11/1/2021, 4:41 PM with
comments
P vs. NP Explained
by
danielrm26
on 10/28/2021, 3:26 PM with
comments
Opiates and Social Media Are Symptoms, Not Causes
by
danielrm26
on 10/18/2021, 2:54 PM with
comments
The Strange World of âGood Enoughâ Fencing
by
danielrm26
on 8/5/2021, 3:36 PM with
comments
Dead Drops and Security Through Obscurity
by
danielrm26
on 7/23/2021, 4:23 PM with
comments
Lens vs. List Learning
by
danielrm26
on 6/22/2021, 10:09 PM with
comments
I Knew Stadia Would Fail
by
danielrm26
on 6/12/2021, 2:54 AM with
comments
by
danielrm26
on 6/12/2021, 2:53 AM with
comments
Tcpdump â 50 Ways to Isolate Traffic
by
danielrm26
on 5/9/2021, 6:22 PM with
comments
How to Avoid Losing Another Generation of Artists, Inventors, and Builders
by
danielrm26
on 4/12/2021, 5:31 PM with
comments
Disambiguating Mass Shootings
by
danielrm26
on 4/3/2021, 7:15 PM with
comments
Casmm: A Visual Model for Password/Auth Security
by
danielrm26
on 3/29/2021, 4:14 PM with
comments
A Password/Auth Maturity Model
by
danielrm26
on 3/25/2021, 2:54 PM with
comments
A Ffuf Primer
by
danielrm26
on 2/17/2021, 8:52 PM with
comments
Big-O Notation Explained
by
danielrm26
on 1/19/2021, 1:32 AM with
comments
On Unionizing Against Tech Companies
by
danielrm26
on 1/6/2021, 3:36 PM with
comments
Google is getting left behind due to horrible UI/UX
by
danielrm26
on 12/14/2020, 5:51 PM with
300
comments
An Agile Primer
by
danielrm26
on 11/11/2020, 3:59 PM with
0
comments
The Simple Reason the Polls Failed So Hard in 2020
by
danielrm26
on 11/5/2020, 5:01 AM with
3
comments
How to Write Well
by
danielrm26
on 10/28/2020, 4:21 PM with
1
comments
Be Running Your Own VPN Server
by
danielrm26
on 10/25/2020, 8:43 PM with
1
comments
Which Newsletters and Podcasts Will Survive the Purge
by
danielrm26
on 10/21/2020, 4:00 PM with
0
comments
Operation Fortify: A US Ransomware Plan
by
danielrm26
on 10/4/2020, 3:40 PM with
0
comments
Cyber Pearl Harbor Already Happened, and Itâs Ransomware
by
danielrm26
on 9/29/2020, 2:30 PM with
0
comments
Everyday Threat Modeling
by
danielrm26
on 9/27/2020, 10:23 PM with
0
comments
The Difference Between a Programmer, a Hacker, and a Developer
by
danielrm26
on 9/23/2020, 5:28 PM with
0
comments
Our Problem Is Gullibility, Not Disinformation
by
danielrm26
on 9/14/2020, 12:46 AM with
38
comments
The Difference Between Deductive and Inductive Reasoning
by
danielrm26
on 9/9/2020, 6:05 PM with
0
comments
Creators Should Move to Their Own Domains and Set Up Direct Monetization
by
danielrm26
on 8/31/2020, 5:39 PM with
16
comments
How to Make Forst Contact with a Mentor
by
danielrm26
on 8/20/2020, 8:04 PM with
0
comments
A Strange DoS on SSH (Amazon EC2)
by
danielrm26
on 7/26/2020, 4:35 PM with
0
comments
Our Lighted Path to Totalitarianism
by
danielrm26
on 7/14/2020, 1:39 PM with
0
comments
Searching for the Ultimate Obstacle to Creativity
by
danielrm26
on 7/7/2020, 2:45 PM with
0
comments
Itâs Time to Get Back to RSS
by
danielrm26
on 5/17/2020, 3:57 PM with
365
comments
Opening vs. Closing Is a False Dichotomy
by
danielrm26
on 4/30/2020, 1:58 AM with
0
comments
Covid Will Accelerate Trends That Were Already Coming
by
danielrm26
on 4/13/2020, 7:05 PM with
0
comments
San Francisco Is a Microcosm of America's Future
by
danielrm26
on 1/9/2020, 2:51 PM with
2
comments
Why Some People Get Sick from the Flu Shot
by
danielrm26
on 11/14/2019, 4:12 PM with
1
comments
My Current Verdict on Nootropics
by
danielrm26
on 9/14/2019, 10:16 PM with
0
comments
My First Impressions of Superhuman
by
danielrm26
on 9/7/2019, 4:05 AM with
0
comments
Vim Config Update: 2019 Edition
by
danielrm26
on 8/25/2019, 1:15 PM with
0
comments
The Difference Between Data, Information, and Intelligence
by
danielrm26
on 8/17/2019, 5:28 AM with
0
comments
Why I Don't Think Craig Wright is Satoshi
by
danielrm26
on 7/6/2019, 7:49 PM with
57
comments
An Ngrok Tutorial and Primer
by
danielrm26
on 6/6/2019, 2:11 PM with
0
comments
Thinking of Deepfakes Like Advertising
by
danielrm26
on 5/29/2019, 3:32 PM with
0
comments
Examples of Bad Metrics
by
danielrm26
on 5/12/2019, 8:13 PM with
0
comments
URI or URL?: and Why the RFCs Don't Help Clarify
by
danielrm26
on 5/3/2019, 10:13 AM with
0
comments
Why Google AMP Is Bad for the Internet
by
danielrm26
on 4/3/2019, 5:35 PM with
1
comments
Do We Need to Reconsider Free Speech Law Due to Technology?
by
danielrm26
on 3/28/2019, 10:09 PM with
3
comments
Tcpdump Examples â 50 Ways to Isolate Specific Traffic
by
danielrm26
on 3/19/2019, 2:43 PM with
0
comments
The Rise of the Corporate Technology Ecosystem
by
danielrm26
on 2/17/2019, 11:30 AM with
0
comments
Technical Professions Progress from Magical to Boring
by
danielrm26
on 2/8/2019, 2:38 PM with
0
comments
Monitor a websiteâs uptime for $0.75 a month
by
danielrm26
on 1/30/2019, 4:56 PM with
0
comments
by
danielrm26
on 1/28/2019, 3:54 PM with
comments
by
danielrm26
on 1/26/2019, 10:11 PM with
comments
by
danielrm26
on 1/14/2019, 9:37 PM with
comments
Monitor a Websiteâs Uptime for $0.75/month Using Amazon Route53
by
danielrm26
on 1/7/2019, 3:40 PM with
0
comments
The Quality of Life in the Bay Area Is Polarizing
by
danielrm26
on 1/5/2019, 10:41 PM with
1
comments
It Appears China Is Building a Massive Espionage Database on America
by
danielrm26
on 1/3/2019, 4:44 PM with
14
comments
Google Is Smashing Multi-Discipline Websites to Combat Fake News
by
danielrm26
on 12/27/2018, 10:36 PM with
2
comments
Another Facebook Bug
by
danielrm26
on 12/16/2018, 8:37 AM with
0
comments
Practical tcpdump Examples
by
danielrm26
on 11/26/2018, 6:29 PM with
0
comments
Stop Trying to Violently Separate Privacy and Security
by
danielrm26
on 9/13/2018, 5:19 PM with
2
comments
Saying Goodbye to ifconfig
by
danielrm26
on 9/13/2018, 1:58 PM with
0
comments
Loyalty Programs Are Another Way We Pay for Things with Our Data
by
danielrm26
on 8/31/2018, 6:48 PM with
0
comments
A Chromium-Based Command-Line Alternative to Curl
by
danielrm26
on 8/28/2018, 8:47 PM with
0
comments
It's Becoming Difficult to Discuss Interesting Topics with People Who Don't Read
by
danielrm26
on 7/30/2018, 3:55 AM with
0
comments
My Tactical Advice for Clearing Depression
by
danielrm26
on 6/18/2018, 2:18 PM with
0
comments
The Western Spiritual Crisis
by
danielrm26
on 4/29/2018, 9:52 PM with
comments
If Youâre Not Doing Continuous Asset Management Youâre Not Doing Security
by
danielrm26
on 4/26/2018, 5:19 PM with
0
comments
Facebookâs Failure Is a Reflection of American Ignorance
by
danielrm26
on 4/12/2018, 11:43 PM with
0
comments
Getting Better at tcpdump
by
danielrm26
on 4/12/2018, 1:34 PM with
0
comments
Why I Switched from Patreon to Memberful
by
danielrm26
on 4/2/2018, 2:05 PM with
0
comments
DevOps as the Art and Science of Deliberate Practice
by
danielrm26
on 3/29/2018, 1:34 PM with
0
comments
The Reason Software Remains Insecure
by
danielrm26
on 3/28/2018, 6:21 PM with
0
comments
Learn the Difference Between Real and Fake Machine Learning
by
danielrm26
on 3/18/2018, 11:22 PM with
0
comments
A vim Tutorial and Primer
by
danielrm26
on 3/16/2018, 3:08 PM with
0
comments
A Shodan Tutorial and Primer
by
danielrm26
on 3/14/2018, 7:44 PM with
0
comments
The Reason Software Remains Insecure
by
danielrm26
on 3/12/2018, 1:22 PM with
0
comments
Apple's Biggest Weakness Is Siri, and It's Becoming a Problem
by
danielrm26
on 3/7/2018, 5:10 PM with
0
comments
Success in Life Is Determined Most by Home Culture, Not the Quality of Schools
by
danielrm26
on 3/7/2018, 5:10 PM with
0
comments
We're Moving to the On-Demand Curated Experience (OCE) Economy
by
danielrm26
on 1/11/2018, 6:39 AM with
0
comments
Machine Learning Will Revolutionize Content Discovery
by
danielrm26
on 1/7/2018, 8:31 PM with
0
comments
A Simple Explanation of the Difference Between Meltdown and Spectre
by
danielrm26
on 1/4/2018, 12:17 AM with
0
comments
Your Mind's Software Is More Important Than Its Hardware
by
danielrm26
on 12/29/2017, 11:14 PM with
0
comments
We Should Be Cautious When Building Evolutionary Algorithms
by
danielrm26
on 12/28/2017, 9:05 PM with
0
comments
Machine Learning (ab)Use Cases
by
danielrm26
on 12/27/2017, 2:36 PM with
0
comments
A List of Machine Learning (Ab)use Cases
by
danielrm26
on 12/22/2017, 5:23 PM with
0
comments
/getawspublicips.sh: Know the Public AWS IPs You Have Facing the Internet
by
danielrm26
on 12/20/2017, 3:50 PM with
0
comments
ML's Biggest Advantage Will Be Superior Coverage, Not Superior Analysis
by
danielrm26
on 12/14/2017, 7:23 PM with
0
comments
Technical Professions Progress from Magical to Boring
by
danielrm26
on 12/9/2017, 9:06 PM with
0
comments
Responsible Disclosure? How About Responsible Behavior?
by
danielrm26
on 11/29/2017, 1:42 PM with
0
comments
Why We'll See AI in Security Operation Centers Sooner Rather Than Later
by
danielrm26
on 11/28/2017, 10:31 AM with
0
comments
Clarity on Net Neutrality
by
danielrm26
on 11/23/2017, 3:22 AM with
0
comments
Seeing a Site's Technology Stack Using Wappalyzer
by
danielrm26
on 11/20/2017, 6:23 PM with
0
comments
The Connection Between Opiate and Smartphone Addiction
by
danielrm26
on 11/19/2017, 11:08 PM with
0
comments
Moving Application Authentication to the Operating System
by
danielrm26
on 11/13/2017, 2:34 PM with
0
comments
When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties
by
danielrm26
on 11/3/2017, 2:12 PM with
0
comments
Russia's Tactics for Attacking America from Within
by
danielrm26
on 11/2/2017, 9:23 PM with
0
comments
A Masscan Tutorial and Primer
by
danielrm26
on 10/30/2017, 3:58 PM with
0
comments
Google AMP Is Not a Good Thing
by
danielrm26
on 10/27/2017, 7:32 PM with
0
comments
How to Use Shodan to Find Listening IoT Devices
by
danielrm26
on 10/26/2017, 5:55 PM with
0
comments
InfoSec Needs to Embrace New Tech Instead of Ridiculing It
by
danielrm26
on 10/26/2017, 5:21 PM with
0
comments
A Tcpdump Tutorial and Primer with Examples
by
danielrm26
on 10/26/2017, 3:34 PM with
0
comments
Engineering Growth Framework â Medium
by
danielrm26
on 10/26/2017, 3:31 PM with
0
comments
Social Proof: Your Secret Weapon for Better Marketing
by
danielrm26
on 10/26/2017, 3:31 PM with
0
comments
InfoSec Players [pdf]
by
danielrm26
on 10/26/2017, 3:29 PM with
0
comments
Obscurity Is a Valid Security Layer
by
danielrm26
on 10/24/2017, 2:29 PM with
109
comments
Beware of Alternate Meaning Loops
by
danielrm26
on 10/23/2017, 11:41 PM with
0
comments
Collection of Less Commonly Used Commands
by
danielrm26
on 10/20/2017, 6:39 PM with
0
comments
The Difference Between a Programmer, a Hacker, and a Developer
by
danielrm26
on 10/20/2017, 6:00 PM with
0
comments
Personal Sensors Are the Next Breakthrough in Consumer Electronics
by
danielrm26
on 10/19/2017, 1:44 AM with
0
comments
Why I Call Myself a Feminist
by
danielrm26
on 10/17/2017, 5:22 PM with
0
comments
My 3 Essential Podcasts
by
danielrm26
on 10/17/2017, 2:25 AM with
1
comments
Russia Is Literally Trying to Destroy America, and How to Do It
by
danielrm26
on 10/16/2017, 6:16 AM with
7
comments
The Differences Between BSD and System V Unix
by
danielrm26
on 10/5/2017, 2:53 PM with
0
comments
The Invisible Line Between Order and Chaos
by
danielrm26
on 10/2/2017, 6:42 PM with
0
comments
Why Biometric Data Breaches Won't Require You to Change Your Body
by
danielrm26
on 9/27/2017, 5:46 PM with
0
comments
Counterintelligence for Cyber Defence
by
danielrm26
on 9/24/2017, 8:20 PM with
0
comments
Why You Should Treat C-Players Like A-Players
by
danielrm26
on 9/24/2017, 7:26 PM with
47
comments
The Difference Between URLs and URIs
by
danielrm26
on 9/19/2017, 9:20 AM with
0
comments
How to Tell If You Should Hire an InfoSec Person with a Music Degree
by
danielrm26
on 9/16/2017, 4:26 PM with
4
comments
A Rudimentary Threat Model Framework for Password vs. TouchID vs. FaceID
by
danielrm26
on 9/14/2017, 6:49 PM with
0
comments
The Difference Between Red, Blue, and Purple Teams
by
danielrm26
on 9/8/2017, 4:55 PM with
0
comments
Learn Vim for the Last Time
by
danielrm26
on 9/7/2017, 3:44 PM with
0
comments
Facial Gestures and Eye Tracking as Computer Inputs
by
danielrm26
on 9/3/2017, 2:17 PM with
0
comments
The False Dichotomy of Conflicting Ideas
by
danielrm26
on 9/3/2017, 2:59 AM with
0
comments
URLs vs. URIs
by
danielrm26
on 8/29/2017, 9:57 PM with
0
comments
Learn Vim as Language and You Won't Forget It
by
danielrm26
on 8/24/2017, 8:33 AM with
0
comments
Information Security Assessment Types
by
danielrm26
on 8/22/2017, 5:20 PM with
0
comments
How I Just Saved $5,500 on My EC2 Bill by Switching to a Reserved Instance
by
danielrm26
on 8/4/2017, 1:50 PM with
0
comments
Good App Features Become OS Features
by
danielrm26
on 7/14/2017, 12:13 PM with
0
comments
One Answer to Failing Advertising Is Customized Product Discovery
by
danielrm26
on 6/30/2017, 5:47 AM with
0
comments
The Difference Between Fedora, Redhat, and CentOS
by
danielrm26
on 5/16/2017, 3:04 PM with
0
comments
My Current Predictions for Thinking Machines
by
danielrm26
on 5/10/2017, 4:01 AM with
0
comments
The Difference Between URLs and URIs
by
danielrm26
on 5/9/2017, 2:41 PM with
0
comments
Vim as Language
by
danielrm26
on 4/25/2017, 6:19 AM with
1
comments
Monitoring SSH Bruteforce Attempts Using Splunk
by
danielrm26
on 4/21/2017, 9:47 AM with
0
comments
AWS IAM Security Terminology Primer
by
danielrm26
on 4/20/2017, 6:55 PM with
0
comments
The Difference Between URLs and URIs
by
danielrm26
on 4/19/2017, 4:15 PM with
0
comments
The Differences Between Red, Blue, and Purple Teams
by
danielrm26
on 4/17/2017, 5:57 PM with
1
comments
A Curated List of High-Quality VPN Providers
by
danielrm26
on 4/10/2017, 4:59 PM with
0
comments
Curated VPN Recommendations
by
danielrm26
on 4/7/2017, 3:25 PM with
0
comments
How to Move to Vim 8.x, with Native Plugin Management
by
danielrm26
on 4/6/2017, 2:14 AM with
0
comments
An Encoding Primer
by
danielrm26
on 4/4/2017, 9:56 PM with
0
comments
The Difference Between URLs and URIs
by
danielrm26
on 4/4/2017, 4:14 PM with
0
comments
The Bottom Turtle of Secrets Management in the Cloud
by
danielrm26
on 3/31/2017, 5:23 PM with
0
comments
Mastering the Infosec Interview
by
danielrm26
on 3/31/2017, 5:15 PM with
0
comments
The Age of the Influencer
by
danielrm26
on 3/26/2017, 5:37 PM with
0
comments
A Response to Benedict Evans on the Limitations of Voice Interfaces
by
danielrm26
on 3/12/2017, 10:27 AM with
0
comments
How to Build a Successful Career in InfoSec
by
danielrm26
on 3/9/2017, 5:19 PM with
1
comments
A Tcpdump Tutorial and Primer with Examples
by
danielrm26
on 3/8/2017, 4:34 PM with
0
comments
by
danielrm26
on 3/7/2017, 10:50 PM with
comments
Mea Culpa Meta Game
by
danielrm26
on 3/2/2017, 6:55 PM with
0
comments
You Should Have Two Different Kinds of Interview
by
danielrm26
on 2/27/2017, 1:30 AM with
0
comments
A Web Performance Primer
by
danielrm26
on 2/8/2017, 3:12 PM with
0
comments
A vim Tutorial and Primer
by
danielrm26
on 2/7/2017, 5:36 PM with
0
comments
How to Build a Career in InfoSec
by
danielrm26
on 2/3/2017, 3:04 PM with
0
comments
Information Security Term Clarifications
by
danielrm26
on 2/2/2017, 4:09 PM with
0
comments
What is Mobile 2.0?
by
danielrm26
on 2/1/2017, 5:58 PM with
0
comments
A Simplified Definition of a Data Scientist
by
danielrm26
on 1/30/2017, 12:37 PM with
0
comments
Machine Learning Is Going to Revolutionize Content Discovery
by
danielrm26
on 1/28/2017, 6:18 PM with
0
comments
Does Next-Gen AppSec Require Next-Gen Developers?
by
danielrm26
on 1/26/2017, 3:43 PM with
0
comments
The Difference Between URLs and URIs
by
danielrm26
on 1/25/2017, 5:18 PM with
0
comments
A vim Tutorial and Primer
by
danielrm26
on 1/25/2017, 5:16 PM with
0
comments
Google AMP Is Not a Good Thing
by
danielrm26
on 1/23/2017, 8:07 PM with
163
comments
OPSEC Is Obscurity, OPSEC Increases Security
by
danielrm26
on 1/22/2017, 7:21 PM with
0
comments
Building a Firewall with Linux and IPTables
by
danielrm26
on 1/18/2017, 6:30 PM with
0
comments
Content Publishing's Biggest Problem Is Discovery: Let's Use Machine Learning
by
danielrm26
on 1/17/2017, 8:52 PM with
0
comments
We Need Medium's Editor, Not Medium
by
danielrm26
on 1/17/2017, 6:13 PM with
8
comments
Active/Passive Spacial Scanners and Machine Learning and Human Behavior Data
by
danielrm26
on 1/15/2017, 7:48 AM with
0
comments
Hacking People via Customization Requests
by
danielrm26
on 1/12/2017, 4:03 AM with
0
comments
If You Believe Nothing You Can Be Convinced of Anything
by
danielrm26
on 1/11/2017, 6:01 PM with
0
comments
Developing for Alexa
by
danielrm26
on 1/4/2017, 7:03 PM with
0
comments
Attacking AI-Based Digital Assistants
by
danielrm26
on 12/29/2016, 8:45 PM with
0
comments
Why Law Firms Are Such Attractive Hacking Targets
by
danielrm26
on 12/29/2016, 8:35 PM with
0
comments
The Difference Between Machine Learning and Statistics
by
danielrm26
on 12/22/2016, 6:26 PM with
0
comments
by
danielrm26
on 12/22/2016, 6:33 AM with
comments
How to Build a Successful Information Security Career
by
danielrm26
on 12/20/2016, 8:37 PM with
0
comments
Honeytrapping Your Environment Without Commercial Tools
by
danielrm26
on 12/19/2016, 11:45 PM with
0
comments
A Future Without Privacy
by
danielrm26
on 12/7/2016, 7:51 AM with
1
comments
Re:Invent 2016 Summary and Analysis
by
danielrm26
on 12/5/2016, 9:17 PM with
0
comments
Evolutionary Algorithms Could Be More Significant Than Machine Learning
by
danielrm26
on 11/28/2016, 8:50 AM with
1
comments
My Analysis of the Philosophy in Westworld
by
danielrm26
on 11/25/2016, 9:09 PM with
1
comments
Stop Being Proud of Complexity
by
danielrm26
on 11/22/2016, 7:45 AM with
0
comments
P vs. NP Explained
by
danielrm26
on 11/19/2016, 12:20 AM with
0
comments
Examples of Design vs. Evolution Thinking in Various Industries
by
danielrm26
on 11/14/2016, 2:36 PM with
0
comments
Tech Hiring Is Design-Based, and It Needs to Move to Evolution-Based
by
danielrm26
on 11/11/2016, 6:31 PM with
0
comments
Who's Responsibility Is It to Provide Jobs to People?
by
danielrm26
on 11/7/2016, 12:54 PM with
3
comments
Why You Should Hire Using Evolution vs. Design Thinking
by
danielrm26
on 11/6/2016, 4:20 PM with
0
comments
If You Don't Vote, Why Should Anyone Take You Seriously?
by
danielrm26
on 11/4/2016, 8:06 PM with
comments
A tcpdump Reference with Examples
by
danielrm26
on 11/3/2016, 2:49 PM with
0
comments
More Captured Mirai Botnet Traffic Analysis
by
danielrm26
on 10/31/2016, 6:10 PM with
0
comments
Some Rudimentary Analysis on IoT Botnet Traffic on Port 23 (telnet)
by
danielrm26
on 10/30/2016, 10:14 PM with
0
comments
The Power of Bottom-Up (Evolution) vs. Top-Down (Design)
by
danielrm26
on 10/30/2016, 7:17 PM with
0
comments
How to See What Facebook Thinks of You
by
danielrm26
on 10/30/2016, 4:48 PM with
1
comments
On Apple's Innovation and Quality
by
danielrm26
on 10/28/2016, 11:52 PM with
0
comments
The Future of Automated Value Exchange for Online Content Creators
by
danielrm26
on 10/27/2016, 4:29 PM with
0
comments
Expect a Move Towards Internet Resilience
by
danielrm26
on 10/24/2016, 6:16 PM with
0
comments
Disambiguation of Security and Obscurity
by
danielrm26
on 10/21/2016, 2:22 AM with
0
comments
Obscurity Is a Valid Security Layer
by
danielrm26
on 10/18/2016, 5:29 PM with
16
comments
The Difference Between URLs and URIs
by
danielrm26
on 10/18/2016, 5:21 PM with
0
comments
Unsupervised Learning: No. 49
by
danielrm26
on 10/18/2016, 11:51 AM with
0
comments
Corporations Don't Want Employees
by
danielrm26
on 10/17/2016, 8:08 PM with
0
comments
Machine Learning Is the New Statistics
by
danielrm26
on 10/16/2016, 8:58 PM with
28
comments
Two Ways to Disrupt an Election
by
danielrm26
on 10/12/2016, 12:47 PM with
0
comments
Information Security's Top 3 Priorities
by
danielrm26
on 10/7/2016, 4:42 AM with
0
comments
What Else Can You Do with an IoT Botnet?
by
danielrm26
on 10/7/2016, 3:41 AM with
0
comments
Genetic Algorithms Could Be More Significant Than Machine Learning
by
danielrm26
on 10/6/2016, 1:29 AM with
1
comments
by
danielrm26
on 10/4/2016, 6:41 AM with
comments
What I Try to Learn from Being Wrong
by
danielrm26
on 9/30/2016, 5:57 AM with
0
comments
My Problem with Threat Intelligence
by
danielrm26
on 9/27/2016, 11:17 PM with
1
comments
IoT and SSRF: A New Attack Vector?
by
danielrm26
on 9/26/2016, 8:12 PM with
0
comments
Learn Vim as Language
by
danielrm26
on 9/26/2016, 6:02 AM with
0
comments
by
danielrm26
on 9/26/2016, 5:56 AM with
comments
Authentication's Last Mile
by
danielrm26
on 9/25/2016, 6:42 PM with
0
comments
Encoding vs. Encryption vs. Hashing vs. Obfuscation
by
danielrm26
on 9/22/2016, 11:13 AM with
0
comments
Tech Primers and Tutorials
by
danielrm26
on 9/19/2016, 8:23 AM with
0
comments
âThe Fear of AIâ Actually Means Two Things
by
danielrm26
on 9/15/2016, 6:46 PM with
0
comments
What the U.S. Should Do with Edward Snowden
by
danielrm26
on 9/13/2016, 5:11 PM with
0
comments
by
danielrm26
on 9/13/2016, 3:21 PM with
comments
How to Install Suricata IDS on Any Linux Box in 5 Minutes
by
danielrm26
on 9/10/2016, 3:51 PM with
3
comments
by
danielrm26
on 9/10/2016, 1:07 AM with
comments
When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties
by
danielrm26
on 9/9/2016, 10:34 AM with
0
comments
From Apps to AI: How Digital Assistants Will Destroy Apps as You Know Them
by
danielrm26
on 9/2/2016, 5:44 PM with
0
comments
Security Assessment Types
by
danielrm26
on 8/29/2016, 7:03 PM with
0
comments
Unbranded Future Vision
by
danielrm26
on 8/29/2016, 12:41 AM with
0
comments
4 Reasons to Run Your Own Email Server
by
danielrm26
on 8/27/2016, 5:08 PM with
0
comments
How Fast Do You Unsubscribe?
by
danielrm26
on 8/27/2016, 2:34 PM with
0
comments
The Real Internet of Things
by
danielrm26
on 8/22/2016, 7:13 AM with
0
comments
Encoding vs. Encryption vs. Hashing vs. Obfuscation
by
danielrm26
on 8/19/2016, 4:35 PM with
0
comments
What If Facebook Jumped in Against Twitter?
by
danielrm26
on 8/18/2016, 7:13 PM with
1
comments
The Different Approaches to Pursuing AI
by
danielrm26
on 8/18/2016, 3:43 PM with
0
comments
The Difference Between URLs and URIs
by
danielrm26
on 8/17/2016, 6:38 PM with
0
comments
A tcpdump Primer with Examples
by
danielrm26
on 7/21/2016, 7:56 PM with
3
comments
On the Rise of Pokemon GO and AR/VR Gaming
by
danielrm26
on 7/9/2016, 8:56 PM with
0
comments
The Difference Between a Programmer, a Hacker, and a Developer
by
danielrm26
on 7/8/2016, 2:14 PM with
1
comments
Five Attributes of an Effective Corporate Red Team
by
danielrm26
on 7/7/2016, 2:59 PM with
0
comments
We Need More Problem / Solution Discovery in Programming
by
danielrm26
on 6/27/2016, 2:36 PM with
0
comments
We Need More Problem / Solution Discovery in Programming
by
danielrm26
on 6/25/2016, 7:44 PM with
0
comments
The Difference Between URLs and URIs
by
danielrm26
on 6/21/2016, 3:05 PM with
0
comments
Fixing the Culture of InfoSec Presentations
by
danielrm26
on 6/16/2016, 4:47 AM with
0
comments
My Explanation for the Sudden Rise in Ransomware
by
danielrm26
on 6/11/2016, 4:46 PM with
1
comments
A Brief Aside on the Word âCyberâ
by
danielrm26
on 6/9/2016, 9:42 PM with
0
comments
by
danielrm26
on 6/8/2016, 7:28 AM with
comments
Obscurity Is a Valid Security Layer
by
danielrm26
on 6/7/2016, 2:06 PM with
212
comments
The Difference Between URLs and URIs
by
danielrm26
on 6/6/2016, 3:47 PM with
1
comments
A Summary of the Internet Trends Report 2016
by
danielrm26
on 6/3/2016, 10:43 PM with
0
comments
What the U.S. Should Do with Edward Snowden
by
danielrm26
on 5/30/2016, 6:03 PM with
1
comments
Corporations Don't Want Employees
by
danielrm26
on 5/29/2016, 5:46 PM with
31
comments
Why Aren't University Lectures Broadcasted to the World?
by
danielrm26
on 5/23/2016, 3:37 AM with
1
comments
DerbyCon Security Conference Moving to Live Streaming Model
by
danielrm26
on 5/23/2016, 3:35 AM with
0
comments
The Difference Between Threats, Vulnerabilities, and Risks
by
danielrm26
on 5/19/2016, 3:35 AM with
0
comments
On the Value of Being Smart
by
danielrm26
on 5/7/2016, 6:54 PM with
0
comments
Encoding and Character Mapping
by
danielrm26
on 4/25/2016, 6:13 PM with
0
comments
A Bettercap Primer
by
danielrm26
on 4/20/2016, 5:17 AM with
0
comments
The Real Problem with Naming Vulnerabilities
by
danielrm26
on 4/15/2016, 6:52 PM with
0
comments
How to Handle a Dip in Creativity and Productivity
by
danielrm26
on 4/10/2016, 9:37 PM with
0
comments
The Real Internet of Things
by
danielrm26
on 4/7/2016, 7:06 AM with
0
comments
Encoding, Encryption, Hashing, and Obfuscation
by
danielrm26
on 3/31/2016, 2:33 PM with
0
comments
The Difference Between a Programmer, a Hacker, and a Developer
by
danielrm26
on 3/31/2016, 2:32 PM with
0
comments
P vs. NP Explained
by
danielrm26
on 3/28/2016, 6:21 PM with
0
comments
AI Assistants Are the New Applications
by
danielrm26
on 3/18/2016, 4:09 AM with
0
comments
A tcpdump Primer with Examples
by
danielrm26
on 3/17/2016, 5:24 PM with
0
comments
Idea Expansion Format (IEF)
by
danielrm26
on 3/15/2016, 6:32 PM with
0
comments
by
danielrm26
on 3/10/2016, 8:09 PM with
comments
Palo Alto Firewalls Can't Update on Leap Year Day
by
danielrm26
on 3/1/2016, 8:27 AM with
0
comments
Chinese Industrial Espionage: Technology Acquisition and Military Modernisation
by
danielrm26
on 3/1/2016, 8:26 AM with
0
comments
My Response to Sam Harris on the Apple Encryption Debate
by
danielrm26
on 2/28/2016, 1:55 PM with
0
comments
Mandiant M-Trends 2016 Summary
by
danielrm26
on 2/26/2016, 4:10 PM with
0
comments
The Glibc DNS Bug Explained
by
danielrm26
on 2/22/2016, 6:15 PM with
0
comments
The Natural Outcome of the Encryption Wars in the U.S
by
danielrm26
on 2/21/2016, 2:11 AM with
0
comments
The Difference Between a Programmer, a Hacker, and a Developer
by
danielrm26
on 2/19/2016, 4:21 PM with
0
comments
Serialization Security Bugs Explained
by
danielrm26
on 2/10/2016, 5:52 PM with
0
comments
The Difference Between Red, Blue, and Purple Teams
by
danielrm26
on 2/9/2016, 1:32 PM with
0
comments
The Components of a Successful InfoSec Career
by
danielrm26
on 2/5/2016, 6:10 PM with
0
comments
IoT 2015 in Review
by
danielrm26
on 2/3/2016, 12:08 PM with
0
comments
Encoding vs. Encryption vs. Hashing vs. Obfuscation
by
danielrm26
on 2/3/2016, 12:07 PM with
0
comments
Why You Should Treat C-Players Like A-Players
by
danielrm26
on 1/31/2016, 9:34 AM with
0
comments
Shodan: The IoT Search Engine
by
danielrm26
on 1/27/2016, 6:52 AM with
0
comments
A Shodan Tutorial and Primer
by
danielrm26
on 1/19/2016, 11:34 AM with
0
comments
The Convergence of AI, IoT, Augmented Reality, and Drones
by
danielrm26
on 1/18/2016, 11:30 AM with
0
comments
3 Reasons Not to Send Sensitive Data in the URL (Even with TLS)
by
danielrm26
on 1/4/2016, 8:08 PM with
0
comments
The Internet, the Deep Web, and the Dark Web
by
danielrm26
on 12/28/2015, 3:11 PM with
0
comments
Sensitive Information Sent in the URL Over HTTPS
by
danielrm26
on 12/22/2015, 12:02 AM with
0
comments
Failing at the Basics in Intelligence and InfoSec
by
danielrm26
on 12/21/2015, 5:44 AM with
1
comments
Public Vulnerability Database Resources
by
danielrm26
on 12/11/2015, 4:42 PM with
0
comments
Why I Don't Think Craig Wright Is Satoshi
by
danielrm26
on 12/10/2015, 7:19 PM with
0
comments
The Hierarchy of Citizenship
by
danielrm26
on 12/9/2015, 9:40 AM with
0
comments
5 Reasons to Expect Many More Public Shootings
by
danielrm26
on 12/2/2015, 10:00 PM with
comments
The Relationship Between Relaxation, Fun, and Genius
by
danielrm26
on 12/2/2015, 12:37 AM with
0
comments
Bug Bounty Ethics and the Ubering of Pentesting
by
danielrm26
on 11/30/2015, 6:06 PM with
0
comments
Collection of Less Commonly Used Commands
by
danielrm26
on 11/25/2015, 1:27 PM with
0
comments
SCADA
by
danielrm26
on 11/25/2015, 12:46 PM with
0
comments
The Lupus in Liberalism
by
danielrm26
on 11/23/2015, 6:46 PM with
0
comments
RobotsDisallowed: Make Sure Your Site Doesn't Do This
by
danielrm26
on 11/20/2015, 3:44 PM with
1
comments
The Eye of Siri
by
danielrm26
on 11/20/2015, 7:47 AM with
0
comments
Why Many Moderate Muslims Don't Believe the ISIS Threat
by
danielrm26
on 11/17/2015, 12:54 AM with
0
comments
The Answer to Terrorism Is Resilience
by
danielrm26
on 11/14/2015, 8:37 PM with
4
comments
Universal Daemonization as Asset Management
by
danielrm26
on 11/12/2015, 5:09 PM with
0
comments
How to Build a Successful Information Security Career
by
danielrm26
on 11/6/2015, 8:35 PM with
0
comments
A Web Performance Primer
by
danielrm26
on 11/5/2015, 11:15 PM with
0
comments
A Collection of Tutorials
by
danielrm26
on 10/30/2015, 11:10 AM with
0
comments
How Twitter Should Work
by
danielrm26
on 10/27/2015, 12:00 PM with
0
comments
Powering Innovation with Inputs
by
danielrm26
on 10/24/2015, 1:00 PM with
0
comments
Replacing Passwords with Out-Of-band Challenges
by
danielrm26
on 10/24/2015, 10:45 AM with
0
comments
A Liberal Gun Owner Explores Existing Data
by
danielrm26
on 10/21/2015, 11:33 PM with
0
comments
3-Phased Information Processing: The IT Meta-Skill
by
danielrm26
on 10/19/2015, 12:00 PM with
0
comments
The Difference Between a Vulnerability Assessment and a Penetration Test
by
danielrm26
on 10/19/2015, 10:59 AM with
0
comments
Information Security as an Emergent Property
by
danielrm26
on 2/6/2015, 6:19 PM with
0
comments
Simple Testing Can Prevent Most Failures
by
danielrm26
on 2/5/2015, 2:24 AM with
0
comments
Apple Fixes 33 Security Bugs in iOS 8.13 Update
by
danielrm26
on 2/3/2015, 5:31 PM with
0
comments
Canadian and US Banks Targeted by Malware
by
danielrm26
on 2/3/2015, 5:30 PM with
0
comments
9 Enhancements to Shell and Vim Productivity
by
danielrm26
on 2/3/2015, 5:29 PM with
0
comments
A vim Primer Screencast
by
danielrm26
on 2/3/2015, 4:59 PM with
0
comments
A List of Under-appreciated Unix/Linux Commands
by
danielrm26
on 2/2/2015, 2:48 PM with
0
comments
Avoiding GitHub's SSH Permissions Prompt
by
danielrm26
on 1/29/2015, 10:37 PM with
0
comments
An lsof Primer
by
danielrm26
on 1/26/2015, 4:48 PM with
0
comments
Streams and the Soul of the Machine
by
danielrm26
on 1/25/2015, 6:06 AM with
0
comments
Pattern: A Web Mining Tool in Python
by
danielrm26
on 1/24/2015, 7:51 PM with
0
comments
Do Open Networks Make You Successful?
by
danielrm26
on 1/24/2015, 7:50 PM with
0
comments
Creating a Realtime Traffic Dashboard with Google Analytics
by
danielrm26
on 1/24/2015, 7:30 PM with
0
comments
From oh-my-zsh to Prezto
by
danielrm26
on 1/24/2015, 6:17 PM with
0
comments
What We Learned About How Planes Fly Was Wrong
by
danielrm26
on 1/24/2015, 9:40 AM with
0
comments
You Should Write Email Like the BBC Writes News Stories
by
danielrm26
on 1/23/2015, 6:59 PM with
0
comments
The Attraction Argument for Why There Are Fewer Women in Certain Industries
by
danielrm26
on 1/22/2015, 3:42 PM with
0
comments
IoT is About Software
by
danielrm26
on 1/22/2015, 3:33 PM with
0
comments
The Future of Work
by
danielrm26
on 1/22/2015, 3:22 PM with
0
comments
America Needs Small Terrorist Attacks
by
danielrm26
on 1/17/2015, 7:17 PM with
0
comments
DEVOPS Keeping it Cool
by
danielrm26
on 1/15/2015, 8:51 PM with
0
comments
Saying Goodbye to Google
by
danielrm26
on 1/15/2015, 8:23 PM with
1
comments
P vs. NP Explained
by
danielrm26
on 1/14/2015, 8:30 PM with
0
comments
Better tcpdump
by
danielrm26
on 1/14/2015, 5:00 PM with
0
comments
Learn Vim Permanently
by
danielrm26
on 1/13/2015, 6:23 PM with
0
comments
Products Have Become Platforms
by
danielrm26
on 1/13/2015, 5:47 PM with
0
comments
Fixing Hardware Startups
by
danielrm26
on 1/13/2015, 5:46 PM with
0
comments
Detecting Anomalies in Stream Data
by
danielrm26
on 1/13/2015, 4:46 AM with
0
comments
IoT's Four Data Problems
by
danielrm26
on 1/13/2015, 4:44 AM with
0
comments
Say No to Self-censorship
by
danielrm26
on 1/13/2015, 4:43 AM with
0
comments
Wood and Water
by
danielrm26
on 1/12/2015, 2:45 AM with
0
comments
AI-Powered Meeting Scheduler X.ai Raises $9.2M Series A
by
danielrm26
on 1/11/2015, 10:06 PM with
76
comments
The First Things I Do on a New Mac
by
danielrm26
on 1/10/2015, 7:36 PM with
0
comments
A grep Tutorial and Primer
by
danielrm26
on 1/8/2015, 3:29 PM with
0
comments
Machine Learning Methods for Computer Security (2012) [pdf]
by
danielrm26
on 1/6/2015, 2:25 PM with
4
comments
IoT Protocols
by
danielrm26
on 1/6/2015, 2:23 PM with
0
comments
AppSec Cali
by
danielrm26
on 1/5/2015, 7:10 AM with
0
comments
BPF Syntax
by
danielrm26
on 1/4/2015, 8:20 AM with
0
comments
Suricata IDS on a CentOS Server in 30 Minutes
by
danielrm26
on 1/3/2015, 7:26 AM with
0
comments
Techâs Year of Contemplative Thinking
by
danielrm26
on 1/1/2015, 6:32 PM with
0
comments
Responsive WordPress Themes
by
danielrm26
on 1/1/2015, 6:31 PM with
0
comments
People Reject Truth When the Conclusions Disagree with Them
by
danielrm26
on 12/27/2014, 5:47 PM with
0
comments
Evolution as Our Source of Meaning
by
danielrm26
on 12/26/2014, 11:53 AM with
0
comments
The Reason I Believe the FBI About the Sony Hack
by
danielrm26
on 12/25/2014, 7:28 AM with
1
comments
Producers vs. Nurturers
by
danielrm26
on 12/14/2014, 6:36 PM with
0
comments
Transparent Business Models
by
danielrm26
on 12/7/2014, 8:54 AM with
0
comments
Web Performance Primer
by
danielrm26
on 12/4/2014, 5:54 PM with
0
comments
The Difference Between SSD and Flash
by
danielrm26
on 11/25/2014, 3:39 PM with
0
comments
An IPTABLES Primer
by
danielrm26
on 11/24/2014, 8:09 AM with
0
comments
Why You Should Run SSH on Another Port
by
danielrm26
on 11/15/2014, 7:13 PM with
3
comments
Using Vim to Blog with WordPress
by
danielrm26
on 11/15/2014, 6:47 PM with
0
comments
The Tiger Hiring Algorithm
by
danielrm26
on 11/15/2014, 5:00 AM with
0
comments
The Truth About Security and Obscurity
by
danielrm26
on 11/12/2014, 2:34 PM with
0
comments
Visual Malware Analysis
by
danielrm26
on 11/11/2014, 12:24 PM with
0
comments
9 Shell and Vim Enhancements
by
danielrm26
on 11/11/2014, 12:22 PM with
1
comments
On IoT UX
by
danielrm26
on 11/5/2014, 2:59 PM with
0
comments
Personal Privacy vs. Production
by
danielrm26
on 11/5/2014, 1:33 PM with
0
comments
Producers vs. Nurturers
by
danielrm26
on 10/31/2014, 5:45 PM with
0
comments
A tmux Primer
by
danielrm26
on 10/30/2014, 2:12 PM with
0
comments
A Fantasy Explanation of Standard vs. Blind SQL Injection
by
danielrm26
on 10/30/2014, 1:16 PM with
0
comments
Installing Homebrew on OS X Yosemite
by
danielrm26
on 10/18/2014, 1:52 PM with
0
comments
Getting Value from Technical Conferences Using Git
by
danielrm26
on 10/12/2014, 3:50 PM with
0
comments
Apple Hasn't Changed, but They Need to Slow Down
by
danielrm26
on 10/4/2014, 4:41 PM with
0
comments
A tmux Primer
by
danielrm26
on 10/4/2014, 3:44 PM with
0
comments
Saying Goodbye to Google Services
by
danielrm26
on 10/2/2014, 3:04 PM with
0
comments
Implementing Web Push in Safari
by
danielrm26
on 9/30/2014, 4:49 PM with
0
comments
Unix / Linux Commands People Should Use More
by
danielrm26
on 9/30/2014, 3:45 PM with
0
comments
Unforgettable Subnetting
by
danielrm26
on 9/28/2014, 6:45 PM with
0
comments
URLs vs. URIs
by
danielrm26
on 9/23/2014, 5:02 PM with
0
comments
An Approach to Vim You Won't Forget
by
danielrm26
on 9/3/2014, 5:10 PM with
0
comments
Illustrating That Free Will Must Be an Illusion Using 25 Lines of Ruby
by
danielrm26
on 8/11/2014, 6:10 AM with
5
comments
Illustrating That Free Will is Impossible Using Ruby
by
danielrm26
on 8/1/2014, 3:04 PM with
1
comments
by
danielrm26
on 8/1/2014, 3:03 PM with
comments
How to Build a Successful InfoSec Career
by
danielrm26
on 7/31/2014, 3:23 PM with
0
comments
Facebook's Goal is to Become AOL
by
danielrm26
on 7/27/2014, 11:48 PM with
0
comments
Manage What Matters, Not What's Measurable
by
danielrm26
on 7/27/2014, 6:40 PM with
0
comments
The Relationship Between Fedora, Redhat, and CentOS
by
danielrm26
on 7/24/2014, 3:28 PM with
0
comments
With Metrics, Less is Often More
by
danielrm26
on 7/23/2014, 12:57 PM with
0
comments
The Difference Between a Programmer, a Hacker, and a Developer
by
danielrm26
on 7/23/2014, 12:07 PM with
3
comments
The Difference Between a URL and a URI
by
danielrm26
on 7/22/2014, 6:50 PM with
0
comments
Randomly Order Your Team Members
by
danielrm26
on 7/22/2014, 6:35 PM with
0
comments
How to Log POST Data in Nginx
by
danielrm26
on 7/10/2014, 3:41 PM with
0
comments
Secure and Performant Wordpress on Nginx
by
danielrm26
on 7/7/2014, 2:40 PM with
1
comments
How to Add Social Media Sharing Buttons Without JavaScript
by
danielrm26
on 7/3/2014, 1:45 PM with
0
comments
A tcpdump Reference
by
danielrm26
on 7/1/2014, 1:56 PM with
0
comments
An Encoding and Character Mapping Primer
by
danielrm26
on 6/25/2014, 5:35 PM with
0
comments
Web Performance Basics
by
danielrm26
on 6/19/2014, 5:59 PM with
0
comments
Using a Single Page iPhone Homescreen
by
danielrm26
on 6/16/2014, 12:31 AM with
0
comments
A Web Performance Primer
by
danielrm26
on 6/9/2014, 3:31 PM with
0
comments
The Future of Work
by
danielrm26
on 6/6/2014, 3:01 PM with
0
comments
Maths for CompSci
by
danielrm26
on 6/4/2014, 3:38 PM with
0
comments
Apple's WWDC Announcements Changed the Game
by
danielrm26
on 6/4/2014, 3:16 PM with
0
comments
The Differences Between Vi, Vim, and Emacs
by
danielrm26
on 6/3/2014, 1:30 PM with
0
comments
Why Google Deserves More Respect Than Apple
by
danielrm26
on 6/2/2014, 8:22 PM with
2
comments
The IT Meta-Skill
by
danielrm26
on 6/2/2014, 1:40 AM with
0
comments
A Beer Primer
by
danielrm26
on 5/30/2014, 4:00 PM with
0
comments
A tmux Tutorial and Primer
by
danielrm26
on 5/19/2014, 5:30 PM with
0
comments
Passing an Information Security Interview
by
danielrm26
on 5/19/2014, 4:04 PM with
0
comments
Using Vim to Blog With Wordpress
by
danielrm26
on 5/19/2014, 1:27 PM with
0
comments
A DNS Tutorial and Primer
by
danielrm26
on 5/13/2014, 3:36 PM with
0
comments
A Security-focused HTTP Primer
by
danielrm26
on 5/5/2014, 2:36 PM with
0
comments
The Difference Between Fedora, Redhat, and CentOS
by
danielrm26
on 4/29/2014, 10:21 AM with
0
comments
9 Enhancements to Shell and Vim Productivity
by
danielrm26
on 4/21/2014, 2:57 PM with
0
comments
URLs vs. URIs
by
danielrm26
on 4/17/2014, 1:47 PM with
0
comments
How Your Mobile Phone Leaks Your Sensitive Information
by
danielrm26
on 4/9/2014, 3:32 PM with
0
comments
Obscurity is a Valid Security Layer
by
danielrm26
on 3/31/2014, 6:07 PM with
0
comments
Protecting Your Site Against CSRF
by
danielrm26
on 3/13/2014, 7:41 PM with
0
comments
An Encoding Primer
by
danielrm26
on 3/11/2014, 3:15 PM with
0
comments
An lsof Reference
by
danielrm26
on 3/6/2014, 3:42 PM with
0
comments
IBM Watson Mobile Development Contest
by
danielrm26
on 3/3/2014, 4:29 PM with
0
comments
Interactive Regex Learning
by
danielrm26
on 3/3/2014, 4:28 PM with
1
comments
ASP.NET Framework Performance
by
danielrm26
on 3/3/2014, 4:28 PM with
2
comments
A git Tutorial and Primer
by
danielrm26
on 3/3/2014, 4:25 PM with
0
comments
A tcpdump tutorial and primer
by
danielrm26
on 2/28/2014, 4:19 PM with
30
comments
Avoiding User Account Harvesting On Your Website
by
danielrm26
on 2/24/2014, 5:00 PM with
0
comments
The Difference Between a Vulnerability Assessment and a Penetration Test
by
danielrm26
on 2/19/2014, 2:56 PM with
0
comments
by
danielrm26
on 2/19/2014, 2:55 PM with
comments
WAVSEP Web Security Scanner Evaluation
by
danielrm26
on 2/17/2014, 4:57 PM with
0
comments
Less Commonly Used Unix Commands
by
danielrm26
on 2/17/2014, 2:21 PM with
92
comments
A Vim Tutorial and Primer
by
danielrm26
on 2/10/2014, 12:59 PM with
64
comments
Securing Your Website's Password Reset System
by
danielrm26
on 2/10/2014, 12:47 PM with
0
comments
Data Driven Documents
by
danielrm26
on 2/5/2014, 5:15 PM with
0
comments
A tcpdump Reference
by
danielrm26
on 2/5/2014, 5:05 PM with
0
comments
A Tmux Walkthrough
by
danielrm26
on 2/4/2014, 4:22 PM with
0
comments
by
danielrm26
on 2/4/2014, 4:21 PM with
comments
Intro to Libclang
by
danielrm26
on 2/4/2014, 4:21 PM with
0
comments
P versus NP Explained
by
danielrm26
on 2/3/2014, 12:36 PM with
50
comments
Vim: From 0-100
by
danielrm26
on 2/3/2014, 10:15 AM with
0
comments
Damn Vulnerable IOS Application
by
danielrm26
on 2/1/2014, 5:46 AM with
2
comments
Daniel Dennett is Wrong About Free Will
by
danielrm26
on 1/29/2014, 7:15 PM with
0
comments
Capstone 2.0
by
danielrm26
on 1/23/2014, 8:52 AM with
comments
by
danielrm26
on 1/7/2014, 9:15 PM with
comments
by
danielrm26
on 12/3/2013, 12:02 AM with
comments
by
danielrm26
on 12/2/2013, 4:18 PM with
comments
by
danielrm26
on 12/2/2013, 2:51 PM with
comments
by
danielrm26
on 12/1/2013, 11:49 PM with
comments
by
danielrm26
on 12/1/2013, 11:46 PM with
comments
by
danielrm26
on 12/1/2013, 5:47 PM with
comments
by
danielrm26
on 12/1/2013, 12:50 AM with
comments
by
danielrm26
on 12/1/2013, 12:50 AM with
comments
by
danielrm26
on 11/26/2013, 3:52 PM with
comments
by
danielrm26
on 11/26/2013, 3:30 PM with
comments
by
danielrm26
on 11/26/2013, 7:21 AM with
comments
by
danielrm26
on 11/26/2013, 6:37 AM with
comments
by
danielrm26
on 11/25/2013, 3:28 PM with
comments
by
danielrm26
on 11/23/2013, 7:29 PM with
comments
by
danielrm26
on 11/23/2013, 7:18 PM with
comments
by
danielrm26
on 11/23/2013, 7:18 PM with
comments
by
danielrm26
on 11/18/2013, 2:42 PM with
comments
by
danielrm26
on 11/18/2013, 1:21 PM with
comments
by
danielrm26
on 11/14/2013, 3:54 PM with
comments
by
danielrm26
on 11/14/2013, 2:04 PM with
comments
by
danielrm26
on 11/11/2013, 6:21 PM with
comments
by
danielrm26
on 11/11/2013, 4:41 PM with
comments
by
danielrm26
on 11/11/2013, 5:13 AM with
comments
by
danielrm26
on 11/8/2013, 5:13 PM with
comments
by
danielrm26
on 11/8/2013, 5:08 PM with
comments
by
danielrm26
on 11/4/2013, 2:11 PM with
comments
by
danielrm26
on 11/4/2013, 6:38 AM with
comments
5 Cool Unix Hacks
by
danielrm26
on 11/3/2013, 12:10 PM with
1
comments
Risk-based Authentication
by
danielrm26
on 11/3/2013, 11:22 AM with
0
comments
Collection of Less Commonly Used Linux/Unix Commands
by
danielrm26
on 11/2/2013, 4:07 PM with
0
comments
by
danielrm26
on 11/2/2013, 3:51 PM with
comments
by
danielrm26
on 11/2/2013, 10:46 AM with
comments
by
danielrm26
on 11/1/2013, 3:18 PM with
comments
by
danielrm26
on 10/31/2013, 3:35 PM with
comments
by
danielrm26
on 10/31/2013, 1:39 PM with
comments
by
danielrm26
on 10/29/2013, 6:22 PM with
comments
Yes, Obscurity is a Valid Security Layer
by
danielrm26
on 10/29/2013, 12:45 PM with
0
comments
by
danielrm26
on 10/29/2013, 12:09 PM with
comments
by
danielrm26
on 10/29/2013, 11:56 AM with
comments
by
danielrm26
on 10/28/2013, 6:06 PM with
comments
by
danielrm26
on 10/28/2013, 3:06 PM with
comments
by
danielrm26
on 10/28/2013, 2:56 PM with
comments
by
danielrm26
on 10/28/2013, 2:10 PM with
comments
Why Putting SSH On Another Port is a Good Idea
by
danielrm26
on 10/26/2013, 2:38 AM with
187
comments
by
danielrm26
on 10/16/2013, 1:48 PM with
comments
by
danielrm26
on 10/14/2013, 2:27 PM with
comments
by
danielrm26
on 10/14/2013, 2:14 PM with
comments
by
danielrm26
on 10/11/2013, 2:53 PM with
comments
by
danielrm26
on 10/11/2013, 2:52 PM with
comments
by
danielrm26
on 10/8/2013, 5:49 PM with
comments
by
danielrm26
on 10/8/2013, 5:01 PM with
comments
by
danielrm26
on 10/4/2013, 4:57 PM with
comments
by
danielrm26
on 10/4/2013, 3:40 PM with
comments
by
danielrm26
on 10/4/2013, 3:05 PM with
comments
by
danielrm26
on 9/30/2013, 2:57 PM with
comments
by
danielrm26
on 9/23/2013, 3:55 PM with
comments
by
danielrm26
on 9/20/2013, 7:47 PM with
comments
by
danielrm26
on 9/11/2013, 1:57 PM with
comments
by
danielrm26
on 9/11/2013, 9:44 AM with
comments
Common Sense as a Prior
by
danielrm26
on 9/9/2013, 2:34 PM with
0
comments
by
danielrm26
on 9/9/2013, 2:22 PM with
comments
by
danielrm26
on 9/7/2013, 3:18 PM with
comments
by
danielrm26
on 8/27/2013, 2:08 PM with
comments
FSFlow: Social Engineering Call Flow
by
danielrm26
on 8/19/2013, 12:31 PM with
0
comments
by
danielrm26
on 8/19/2013, 12:24 PM with
comments
by
danielrm26
on 8/10/2013, 3:52 PM with
comments
by
danielrm26
on 8/7/2013, 4:23 PM with
comments
9 Vim and Shell Enhancements
by
danielrm26
on 8/7/2013, 12:51 PM with
0
comments
by
danielrm26
on 7/21/2013, 5:25 PM with
comments
by
danielrm26
on 6/8/2013, 2:09 AM with
comments
Obama Owes us an Apology and an Explanation
by
danielrm26
on 6/7/2013, 2:49 PM with
9
comments
Hacker News Coverage of the NSA Stories (IMG)
by
danielrm26
on 6/7/2013, 9:20 AM with
47
comments
by
danielrm26
on 5/20/2013, 12:19 PM with
comments
by
danielrm26
on 5/20/2013, 12:13 PM with
comments
Solving Mazes With AI
by
danielrm26
on 5/14/2013, 4:16 PM with
0
comments
Changing Your SSH Port Does Lower Your Risk
by
danielrm26
on 5/14/2013, 1:53 PM with
15
comments
by
danielrm26
on 5/8/2013, 3:21 PM with
comments
by
danielrm26
on 5/8/2013, 5:59 AM with
comments
The Reason Google is Terrified of Facebook
by
danielrm26
on 4/29/2013, 5:12 PM with
3
comments
by
danielrm26
on 4/29/2013, 3:12 PM with
comments
by
danielrm26
on 4/21/2013, 4:15 PM with
comments
by
danielrm26
on 3/6/2013, 3:32 PM with
comments
by
danielrm26
on 3/6/2013, 1:56 PM with
comments
by
danielrm26
on 3/4/2013, 6:24 PM with
comments
by
danielrm26
on 2/15/2013, 3:36 PM with
comments
Using lsof
by
danielrm26
on 2/11/2013, 1:04 PM with
0
comments
Use Google's Copy of Popular Libraries
by
danielrm26
on 2/6/2013, 4:50 PM with
0
comments
Point to Google's Copy of Popular Libraries
by
danielrm26
on 2/6/2013, 5:04 AM with
0
comments
by
danielrm26
on 1/29/2013, 6:40 PM with
comments
by
danielrm26
on 1/25/2013, 4:47 PM with
comments
Find
by
danielrm26
on 1/24/2013, 5:07 PM with
0
comments
by
danielrm26
on 1/11/2013, 4:30 PM with
comments
by
danielrm26
on 12/16/2012, 12:11 AM with
comments
by
danielrm26
on 12/10/2012, 4:18 PM with
comments
by
danielrm26
on 12/8/2012, 7:32 PM with
comments
by
danielrm26
on 12/8/2012, 7:26 PM with
comments
by
danielrm26
on 11/27/2012, 2:10 PM with
comments
The Fixed vs. Growth Mindsets
by
danielrm26
on 11/26/2012, 7:19 PM with
0
comments
by
danielrm26
on 11/21/2012, 5:34 PM with
comments
An Argument That We're Living in a Simulation
by
danielrm26
on 11/21/2012, 5:22 PM with
5
comments
by
danielrm26
on 11/21/2012, 5:21 PM with
comments
by
danielrm26
on 11/17/2012, 6:36 AM with
comments
by
danielrm26
on 11/12/2012, 5:06 PM with
comments
List of Logical Fallacies
by
danielrm26
on 11/12/2012, 5:04 PM with
0
comments
A tcpdump Tutorial and Primer
by
danielrm26
on 11/5/2012, 4:56 PM with
26
comments
by
danielrm26
on 11/2/2012, 6:30 PM with
comments
Have Amazon Ship You Reusables Regularly
by
danielrm26
on 11/1/2012, 7:41 PM with
0
comments
by
danielrm26
on 10/30/2012, 12:16 PM with
comments
Enhancements to Shell and Vim Productivity
by
danielrm26
on 10/15/2012, 2:32 PM with
58
comments
by
danielrm26
on 10/11/2012, 4:22 PM with
comments
An Illustrated Guide to SSH Forwarding
by
danielrm26
on 10/11/2012, 3:57 PM with
0
comments
by
danielrm26
on 10/11/2012, 3:47 PM with
comments
by
danielrm26
on 10/11/2012, 3:36 PM with
comments
by
danielrm26
on 10/11/2012, 3:12 PM with
comments
Why the Future Doesn't Need Us
by
danielrm26
on 10/3/2012, 2:56 PM with
0
comments
What We Learned in School About How Planes Fly Was Wrong
by
danielrm26
on 8/27/2012, 5:06 PM with
1
comments
by
danielrm26
on 8/24/2012, 3:53 PM with
comments
The Real Reason to Exercise
by
danielrm26
on 8/20/2012, 8:08 PM with
0
comments
by
danielrm26
on 8/20/2012, 4:51 PM with
comments
Finland's Education Lesson: Equity Over Excellence
by
danielrm26
on 8/20/2012, 1:27 PM with
0
comments
by
danielrm26
on 8/20/2012, 1:13 PM with
comments
by
danielrm26
on 8/10/2012, 5:40 PM with
comments
Planned vs. Random Leisure
by
danielrm26
on 7/31/2012, 2:11 PM with
0
comments
by
danielrm26
on 6/22/2012, 5:25 PM with
comments
Gamification of Tasks That Require Self-discipline is a Mistake
by
danielrm26
on 5/13/2012, 10:38 PM with
0
comments
The Graph All H.S. English Teachers Should Mount in Their Classrooms
by
danielrm26
on 4/18/2012, 3:16 PM with
0
comments
by
danielrm26
on 4/18/2012, 3:07 PM with
comments
Various Notable Development Setups
by
danielrm26
on 3/31/2012, 11:41 PM with
0
comments
by
danielrm26
on 3/20/2012, 5:27 PM with
comments
by
danielrm26
on 3/19/2012, 6:23 PM with
comments
A Tcpdump Tutorial and Primer
by
danielrm26
on 3/15/2012, 3:11 PM with
6
comments
Hacker Dojos Arenât Factories for âIdeaâ People
by
danielrm26
on 2/19/2012, 11:43 PM with
14
comments
by
danielrm26
on 2/19/2012, 11:42 PM with
comments
by
danielrm26
on 2/15/2012, 4:57 PM with
comments
by
danielrm26
on 2/8/2012, 7:02 PM with
comments
by
danielrm26
on 2/8/2012, 7:00 PM with
comments
by
danielrm26
on 2/6/2012, 5:25 PM with
comments
by
danielrm26
on 2/1/2012, 5:53 PM with
comments
An Illustrated Guide to SSH Forwarding
by
danielrm26
on 1/17/2012, 5:10 PM with
0
comments
by
danielrm26
on 1/17/2012, 4:54 PM with
comments
by
danielrm26
on 1/17/2012, 4:54 PM with
comments
by
danielrm26
on 1/17/2012, 4:52 PM with
comments
by
danielrm26
on 1/17/2012, 3:59 PM with
comments
by
danielrm26
on 1/17/2012, 2:09 PM with
comments
by
danielrm26
on 1/16/2012, 8:18 PM with
comments
by
danielrm26
on 1/16/2012, 6:57 PM with
comments
by
danielrm26
on 1/16/2012, 6:54 PM with
comments
Schools Continue To Give Wrong Information Regarding How Planes Fly
by
danielrm26
on 1/10/2012, 6:45 PM with
0
comments
by
danielrm26
on 1/10/2012, 6:29 PM with
comments
by
danielrm26
on 1/10/2012, 6:18 PM with
comments
by
danielrm26
on 1/10/2012, 1:39 PM with
comments
by
danielrm26
on 12/13/2011, 4:35 PM with
comments
by
danielrm26
on 12/13/2011, 4:14 PM with
comments
by
danielrm26
on 12/13/2011, 3:36 PM with
comments
Information Security Interview Questions
by
danielrm26
on 12/9/2011, 1:09 PM with
0
comments
by
danielrm26
on 12/9/2011, 11:09 AM with
comments
by
danielrm26
on 12/9/2011, 10:42 AM with
comments
by
danielrm26
on 12/8/2011, 2:32 PM with
comments
An Illustrated Guide to Cryptographic Hashes
by
danielrm26
on 11/28/2011, 2:22 PM with
11
comments
Tech Hiring Lessons Learned
by
danielrm26
on 11/28/2011, 2:12 PM with
30
comments
by
danielrm26
on 11/25/2011, 4:10 PM with
comments
by
danielrm26
on 11/25/2011, 2:50 PM with
comments
The Other Half of Online Education
by
danielrm26
on 11/18/2011, 5:46 PM with
0
comments
by
danielrm26
on 11/18/2011, 5:13 PM with
comments
by
danielrm26
on 11/18/2011, 4:29 PM with
comments
by
danielrm26
on 11/18/2011, 4:07 PM with
comments
by
danielrm26
on 11/18/2011, 4:01 PM with
comments
by
danielrm26
on 11/18/2011, 3:33 PM with
comments
by
danielrm26
on 11/15/2011, 3:31 PM with
comments
by
danielrm26
on 11/15/2011, 3:17 PM with
comments
by
danielrm26
on 11/14/2011, 5:08 PM with
comments
by
danielrm26
on 11/14/2011, 4:57 PM with
comments
by
danielrm26
on 11/14/2011, 4:56 PM with
comments
by
danielrm26
on 11/14/2011, 4:53 PM with
comments
by
danielrm26
on 11/7/2011, 4:43 PM with
comments
by
danielrm26
on 10/31/2011, 4:37 PM with
comments
by
danielrm26
on 10/26/2011, 4:24 PM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
by
danielrm26
on 10/13/2011, 12:38 AM with
comments
Poll: Do You Deal with Depression?
by
danielrm26
on 10/13/2011, 12:38 AM with
0
comments
Born Digital
by
danielrm26
on 10/11/2011, 10:16 PM with
7
comments
by
danielrm26
on 10/10/2011, 4:54 PM with
comments
An lsof Primer
by
danielrm26
on 10/10/2011, 4:04 PM with
21
comments
by
danielrm26
on 9/30/2011, 6:43 PM with
comments
An Illustrated Guide to IPSEC
by
danielrm26
on 8/22/2011, 3:54 PM with
0
comments
by
danielrm26
on 8/22/2011, 3:43 PM with
comments
by
danielrm26
on 8/18/2011, 3:56 PM with
comments
by
danielrm26
on 8/4/2011, 6:01 PM with
comments
by
danielrm26
on 8/4/2011, 5:33 PM with
comments
by
danielrm26
on 7/28/2011, 4:15 PM with
comments
by
danielrm26
on 7/18/2011, 3:24 PM with
comments
by
danielrm26
on 7/7/2011, 2:36 PM with
comments
by
danielrm26
on 7/6/2011, 2:36 PM with
comments
Interesting Web Data from 24 Hours on Hacker News' Front Page
by
danielrm26
on 7/6/2011, 1:52 PM with
11
comments
by
danielrm26
on 7/6/2011, 1:29 PM with
comments
A git Primer
by
danielrm26
on 7/5/2011, 4:10 PM with
19
comments
Life Optimization
by
danielrm26
on 6/20/2011, 3:17 PM with
0
comments
by
danielrm26
on 6/20/2011, 1:31 PM with
comments
by
danielrm26
on 6/20/2011, 1:30 PM with
comments
by
danielrm26
on 6/9/2011, 5:44 PM with
comments
Tomorrow's IT Department: Business Reps + Outsourced Pools
by
danielrm26
on 6/6/2011, 3:49 PM with
1
comments
by
danielrm26
on 6/6/2011, 3:22 PM with
comments
The People Attacking College Seem Awful Good at Writing
by
danielrm26
on 6/6/2011, 2:49 PM with
1
comments
by
danielrm26
on 6/6/2011, 2:31 PM with
comments
by
danielrm26
on 6/3/2011, 1:36 PM with
comments
by
danielrm26
on 5/24/2011, 3:51 PM with
comments
SQL Injection by Example
by
danielrm26
on 5/20/2011, 5:20 PM with
0
comments
Effective Scholarship
by
danielrm26
on 5/20/2011, 4:53 PM with
0
comments
Mobile Security: The iPhone is Sweden; Android is Africa
by
danielrm26
on 5/20/2011, 4:41 PM with
0
comments
by
danielrm26
on 5/5/2011, 1:36 PM with
comments
by
danielrm26
on 5/4/2011, 2:11 PM with
comments
If The Problem Were American Schools, Asian Children Would Be Failing as Well
by
danielrm26
on 5/2/2011, 2:58 PM with
1
comments
Security and Obscurity Revisited
by
danielrm26
on 4/29/2011, 5:34 PM with
0
comments
A List of WebAppSec Resources
by
danielrm26
on 4/29/2011, 5:14 PM with
0
comments
by
danielrm26
on 4/8/2011, 5:09 AM with
comments
by
danielrm26
on 4/8/2011, 5:09 AM with
comments
Poll: iPhone or Android
by
danielrm26
on 4/8/2011, 5:09 AM with
34
comments
How Free Will Shapes Our Politics
by
danielrm26
on 3/18/2011, 3:54 PM with
0
comments
12 Virtues of Rationality
by
danielrm26
on 2/25/2011, 5:20 PM with
0
comments
by
danielrm26
on 2/25/2011, 5:03 PM with
comments
by
danielrm26
on 2/25/2011, 5:03 PM with
comments
by
danielrm26
on 2/22/2011, 6:03 PM with
comments
by
danielrm26
on 2/22/2011, 6:03 PM with
comments
Generalizing From One Example
by
danielrm26
on 2/22/2011, 5:51 PM with
0
comments
by
danielrm26
on 2/22/2011, 5:30 PM with
comments
Not All SYN Packets Are Created Equal
by
danielrm26
on 2/21/2011, 7:33 PM with
0
comments
by
danielrm26
on 2/21/2011, 3:58 AM with
comments
Obscurity: Does Changing Your SSH Port Lower Your Risk?
by
danielrm26
on 2/18/2011, 4:38 PM with
93
comments
by
danielrm26
on 2/18/2011, 4:14 PM with
comments
by
danielrm26
on 2/11/2011, 6:09 PM with
comments
by
danielrm26
on 2/4/2011, 4:51 PM with
comments
The Three IT Roles: The King, Sage, and the Cog
by
danielrm26
on 2/4/2011, 4:41 PM with
0
comments
by
danielrm26
on 2/4/2011, 4:39 PM with
comments
by
danielrm26
on 12/21/2010, 5:06 PM with
comments
Beyond SSH Bookmarks
by
danielrm26
on 12/9/2010, 3:28 PM with
1
comments
Getting More from Tcpdump
by
danielrm26
on 12/8/2010, 6:08 PM with
0
comments
Parent to Child Propagation of False Meaning
by
danielrm26
on 12/4/2010, 10:01 PM with
2
comments
ADD is a Child-rearing Culture Problem
by
danielrm26
on 11/21/2010, 10:17 PM with
6
comments
by
danielrm26
on 11/15/2010, 4:04 PM with
comments
Why Thinner People Are More Creative
by
danielrm26
on 11/15/2010, 6:13 AM with
3
comments
by
danielrm26
on 11/12/2010, 2:06 PM with
comments
by
danielrm26
on 10/13/2010, 4:46 AM with
comments
by
danielrm26
on 9/21/2010, 3:16 PM with
comments
The Decline of Reddit, Hacker News, and the United States
by
danielrm26
on 8/20/2010, 5:06 AM with
15
comments
by
danielrm26
on 8/20/2010, 5:06 AM with
comments
by
danielrm26
on 8/2/2010, 12:35 PM with
comments
by
danielrm26
on 7/27/2010, 6:17 PM with
comments
by
danielrm26
on 7/19/2010, 4:58 PM with
comments
Feel Beats Features, Stop Being Surprised
by
danielrm26
on 7/15/2010, 6:16 PM with
0
comments
by
danielrm26
on 7/15/2010, 6:14 PM with
comments
Flattr, and Why It's Brilliant
by
danielrm26
on 7/8/2010, 3:40 PM with
59
comments
IPhone vs. Android Re-sale Values
by
danielrm26
on 7/6/2010, 3:02 PM with
2
comments
Disk Performance: Linode vs. Slicehost
by
danielrm26
on 7/5/2010, 7:24 PM with
7
comments
by
danielrm26
on 6/29/2010, 3:45 PM with
comments
by
danielrm26
on 6/29/2010, 3:41 PM with
comments
The Real Reason Education Matters
by
danielrm26
on 6/24/2010, 1:01 PM with
0
comments
The Craziest Thing Youâll Ever Learn About Pi
by
danielrm26
on 6/22/2010, 3:35 PM with
0
comments
CAPTCHA + Calculation (As Opposed to One or the Other)
by
danielrm26
on 6/18/2010, 3:56 PM with
1
comments
Conceptually Summarizing the Classics
by
danielrm26
on 6/16/2010, 5:50 PM with
2
comments
Triple Your Online Reading Speed Using a Bookmarklet
by
danielrm26
on 6/15/2010, 4:44 PM with
0
comments
How to Succeed as a Consultant
by
danielrm26
on 6/14/2010, 9:05 PM with
27
comments
Absolute vs. Practical Free Will
by
danielrm26
on 5/26/2010, 6:00 PM with
0
comments
by
danielrm26
on 5/13/2010, 4:18 AM with
comments
PayPal and Two-Factor Authentication: A "Weakest Link" Case in Point
by
danielrm26
on 4/7/2010, 3:14 PM with
4
comments
by
danielrm26
on 4/7/2010, 3:06 PM with
comments
by
danielrm26
on 4/7/2010, 1:34 PM with
comments
The Steam, Water, and Ice of Modern Communication
by
danielrm26
on 4/6/2010, 12:27 PM with
0
comments
The Worst Mistake People Make in Political Arguments
by
danielrm26
on 4/5/2010, 4:31 PM with
2
comments
Federated ID, OpenID, and OAuth
by
danielrm26
on 3/26/2010, 2:28 PM with
0
comments
Modern Science on Self-Control, and How to Improve It
by
danielrm26
on 3/23/2010, 2:28 PM with
0
comments
by
danielrm26
on 3/23/2010, 2:19 PM with
comments
A Fantasy Explanation of Standard vs. Blind SQL Injection
by
danielrm26
on 1/22/2010, 8:16 PM with
0
comments
Federated ID, OpenID, and OAuth: A Web Auth Primer
by
danielrm26
on 8/17/2009, 1:57 PM with
0
comments
Down and Out in the Magic Kingdom
by
danielrm26
on 8/10/2009, 8:33 PM with
0
comments
Any Good Sites to Supplement HN?
by
danielrm26
on 8/1/2009, 2:23 PM with
4
comments
A Character Encoding and Mapping Primer
by
danielrm26
on 7/27/2009, 1:49 PM with
0
comments
The Argument Pyramid
by
danielrm26
on 7/26/2009, 3:50 PM with
3
comments
What You Learned About How Planes Fly Was Probably Wrong
by
danielrm26
on 7/26/2009, 2:25 PM with
40
comments
Cognitive Dissonance on Public Healthcare
by
danielrm26
on 7/25/2009, 12:16 AM with
4
comments
Meaning is an Illusion
by
danielrm26
on 7/20/2009, 4:09 AM with
0
comments
Getting More Out of Tcpdump
by
danielrm26
on 7/19/2009, 12:29 AM with
2
comments
A Tcpdump Primer
by
danielrm26
on 3/4/2009, 2:18 PM with
0
comments
Using Git to Update a Personal Website
by
danielrm26
on 1/2/2009, 8:30 PM with
0
comments