Some people think onion routing or the Tor network is for criminals and people with something to hide. Well, they are half right. The Tor network was designed to give a masked, “semi-safe”, passage to those who needed to get information out. According to its website, “Tor was originally […]
Sometimes, at the beginning of my adventure to the Internet, I was wondering how it is that I have a local area network and Internet access. See for yourself, turn on your computer and after some time we will see the screen of our desktop operating system. Then the […]
Whenever we’re doing a penetration test, it’s good to figure out the topology of the network we’re testing. We can’t figure out the whole topology, because we don’t have access to their internal network, but even if we manage to figure out part of the topology it’s pretty […]
Q: A Collection of Metasploit Modules Not Accepted to Main Trunk for Various Policy or Quality Reasons
I guess we all know what Metasploit is, so we don’t really need to present to the reader the basics of Metasploit. But it’s still useful if we present the type of modules the Metasploit has. Metasploit has the following types of modules:
Auxiliary Modules: perform scanning and sniffing and […]
For part 1 of this series, please click here.
In the first part, our discussion of the estimation focused primarily on the general principles of creating any type of estimate. It also showed the importance of proper assessment to make your life easier and save you disagreements with clients and […]
Each of us who has ever worked in any programming project has had to deal with one of the biggest problems we face when creating projects. It is, of course, the execution time estimate. The question about the duration of the project appears in virtually every conversation prior. Definitely […]
Thoughts from My Three-Night Coding Excursion: Part 3 – Leveraging C# for Your Daily Reverse Engineering
For part 2 of this series, please click here.
C# is my favourite language and I definitely intend to stick with it, as the community is amazing and more and more programming paradigms are incorporated in .NET. From Eiffel to F#, IronPython to managed/unmanaged C++/CLI, you can’t go wrong with […]
For part 1 of this series, please click here.
Let’s get on to understanding the GDI+ library to leverage the use of C# and build any kind of visual unit you want. The moment you use GDI+, the confines of a form breaks down, at the very least visually. You […]
I will discuss a few topics that motivate me to make software the way I like it. Currently I am writing an Android analysis tool and since I am using C# for the same, I do have a few things to share as notes from my daily excursions in […]
For part 5 of this series, please click here.
Here’s another article on human resource management. We will work in the efficiency aspect and introduce elements of discipline in Agile. Of course, some form of bracing is not harmful, if we do not then we fall from extreme to extreme. […]
As I mentioned in a previous article, it is time to return to human resource management. We will focus here on the re-generation of projects in teams. But first, we will educate ourselves about the types of projects that can be implemented in the project team.
Types of projects we […]
A few days ago, I attended (and maybe trolled) a hacker conference called ROOTCON in Cebu City, Philippines at Cebu Parklane Hotel. To be honest, this is my second experience with ROOTCON and I think there are a lot of things I learned from this experience. One of the […]
InfoSec Institute is seeking an energetic and innovative Content Acquisition Manager for our Intense School brand to develop and maintain an industry-leading online publication. You will shape the success for our program’s initiatives by developing and defining the content and publishing schedule. This is a multi-faceted job in a […]
If you woke up tomorrow morning and found that your computer or portable device wouldn’t turn on, or had been stolen, what would you do? I’m a computer troubleshooter, web designer and IT teacher, backups are my passion and I ask that question of all my clients..
Some look smug […]
In the previous parts of our discussion we focused on internal team building and communication within the team and self-motivation. Today we will go on. We’ll talk about how all this fits into the environment of Agile and talk about the production of products in Agile environments. So let’s […]
In a previous article we discussed how we can build a good team, composed of professionals. We got to know the ins and outs of good feedback. Now we are moving on to much more difficult issues. Namely, we talk about communication, cooperation and motivation. After all, it may […]
Part one of this article series can be found here: Human Resource Management in Agile Part 2.
From the previous article you could find out what mistakes you make when implementing your own projects and business projects. Today we’ll do something a little different. We will learn how to build […]
Human Resource Management in Agile – Part 1
I think we all have been behind projects that were not successful. They can be both our own projects and projects for clients. This article is a continuation of risk management in projects related to Agile, but is an entirely different facet, […]
In connection with the upcoming USA presidential elections in 2012, I would like to discuss holding the election via the Internet and the risks associated with it. This is not a technical text; it does not show a technician carrying out attacks on individual choices. It is an article […]
1. Introduction to Tor Bridging
Running a Tor bridge is essentially the same as running a Tor relay, as far as configuration is concerned. We already mentioned that the only difference is that Tor bridges are not listed in the Tor directory. We also said that using a bridge is […]