General security April 28, 2011 Darren Dalasta Grep Essentials grep The grep utility, which allows files to be searched for strings of words, uses a syntax similar to the regular expression syntax of the vi, ex, ed, and...
General security April 27, 2011 Darren Dalasta Mac Shortcuts To use a keyboard shortcut, or key combination, you press a modifier key with a character key. For example, pressing the Command key and the "c" key at...
General security April 26, 2011 Darren Dalasta Useful Linux Commands echo 1 > /proc/sys/net/ipv4/ip_forward enables ipv4 forwarding on backtrack, and other distros. Bash commands cut -d" " -f2 > new (cuts from an...
General security April 26, 2011 Ryan Dewhurst Insecure Defaults Lead to Mass Open Proxies in China Description: A bug in Chinese video streaming software leads to mass open proxies on the web. A security blogger has uncoverd a flaw in the Chinese PPLive...
General security April 18, 2011 Infosec David Litchfield Reveals His Process for Security Research In our ongoing series of interviews, this week David Litchfield answered a few questions and pulled back the curtain a bit on the methods, tools and motivation...
General security March 24, 2011 Keatron Evans iPhone Security: 10 Tips and Settings The iPhone is one of the most popular mobile devices on the market with an array of downloadable apps for users to do any number of things. Its popularity and...
General security March 22, 2011 Jack Koziol HD Moore Reveals His Process for Security Research In our ongoing series of interviews, we got HD Moore to answer a few questions and pull back the curtain a bit on the methods, tools and motivation for the...
General security November 3, 2010 Keatron Evans iPhone App Exposes Pontentially Anyone’s Social Security Number. There has been web sites around for a while that allows one to listen in on certain police, fire department, and other public service radio bands. Now this...
General security September 10, 2010 Jack Koziol Interview with Don Donzal of the Ethical Hacker Network and ChicagoCon Our latest interview is with Donald C. Donzal - perhaps best-known now as the founder and editor of The Ethical Hacker Network and ChicagoCon. Don had his first...
General security August 16, 2010 Jack Koziol Interview with Mike Rothman Below is an interview conducted with Mike Rothman. Mike specializes in protecting networks and endpoints, security management, and compliance. He is one of...