-
SMOG button removed!
Almost a year ago I added a SMOG button to each blogpost, which (in a more or less serious manner) evaluated the “reading level” needed to understand the blogpost. However, today the site used for this service came up with a warning from Google saying that it might be malicious. I’ve looked into it, and…
-
ERR – Exponentially Expanding Rants
I’m expanding! Not only am I ranting on my own soap box (blog), now you can read my rants on other blogs as well: fudsec just published my Knowing Walls from Speed Bumps rant. Thank you! If you are fed up with FUD in the security industry, check out the site and went away! Who…
-
The Myths of Innovation
Some time ago I ranted about cognitive quantum leaps. Below is a presentation given at Google by Scott Berkun about the same topic. While the talk itself is two years old, the examples are still very relevant, and he presents it very eloquently. Enjoy!
-
Carcassonne – a great boardgame
My personal favorites are (board)games which create complexity from simple rules, for example chess, go or FPSs in the virtual world. A boardgame which comes close to this ideal is Carcassonne. The rules can be explained in less than two minutes and it is great fun! See below the recording of a nine hour game:…
-
delicious/cdman83
InstEd It! – InstEd – Make packaging more productive Posted: 26 Aug 2009 11:45 PM PDT Tv’s cobweb: Git for Computer Scientists Posted: 29 Aug 2009 07:13 AM PDT Pro Git – Table of Contents Posted: 29 Aug 2009 07:12 AM PDT StockCharts.com – ChartSchool – ChartSchool Posted: 29 Aug 2009 06:24 AM PDT CrypTool…
-
Network Forensics Contest submission
Some time ago I mentioned the Network Forensics Puzzle. The contest is now over and since I didn’t win, I’ll publish my submission below – it was after all correct, but not quite what the judges were looking for (congratulation to the winner). After validating that the MD5 sum for the downloaded file matches the…
-
Back with a vengeance
I’ve had limited connectivity / time in the last couple of weeks, but I’m back baby! The lesson of the day: you shouldn’t let your AV vendor provide general security. The lesson comes to us via Graham Cluley’s Sophos blog, which informs us that Sophos released a free encryption tool. So, what’s wrong with it?…
-
Ethical Hacker challenge “Prison Break” solution
As I usually do, I’ll publish my entry for the Ethical Hacker challenge after the deadline passed: Challenge Question 1: What is the most probable reason Michael could not get network connectivity from the desk Ethernet jack? What actions should the team take to determine exactly what is going on, collect full traffic captures, and…
-
Geek pr0n – time lapse video of building racks
Via run-virtual.com.
-
T2’09 Challenge
Sorry for being a little late: the T2’09 challenge just started. Via the F-Secure weblog. Don’t be fooled by the fact that page already contains two entries (“Mr. Speed” and “Mr. Style”) in the top. From what I understand, these are to signal that two winners will be selected, one for speed and one for…