-
Be honest about your reasons!
Update: Kurt said it much better in the comments. You should read it instead of my ramblings :-). I also remembered the French version of this saying: Qui s’excuse, s’accuse. Unfortunately meta-justifications and white lies seem to be a deeply embedded part of humans (so much so that we invent names like “politeness” for them…
-
Style is important
Because you are not writing programs for the compiler, you are writing it for the human who is coming after you (and he might be a psychopath who knows where you live :-)). Here is a nice related post from the creator of VirtualDub: Undoing indentation hell.
-
000webhost.com trying to install malware
I needed a quick, free webhost. Incidentally (it is funny how things come together sometimes) I remembered Andreas Gohr mentioning 000webhost.com, so I decided to give it a try. Now, I knew that nothing is free, so I expected to need to insert some banner ads in the pages, however it seems that this hosting…
-
25C3 videos posted
Via splitbrain.org and security4all: the 25C3 videos have been posted. Enjoy everybody 🙂
-
Javascript regex quirk
When I’ve written the SMOG analyzer javascript I found a quirk of javascript and this recent post inspired me to share it: The javascript regex specification doesn’t have the s modifier. This is necessary when you want to match multiple lines with a construct like .*. The suggested workaround I found was to specify the…
-
A very cool idea!
I’ve been hearing a lot lately about a terminal emulator called “Terminator” for Linux, so I decided to give it a try. While looking at the authors site, I found the following posting: My new project: juicyD (maybe) The idea is simple, but has a stroke of genius in it: instead of burning CD’s, store…
-
Solution for the Ethical Hacker Network Challenge
As always, I’m publishing my submission to the latest Ethical Hacker Network Challenge (after the submission deadline of course). I believe that publishing all the solutions (rather than just the winner) creates a richer environment to learn from each-other. The basic idea came from me seeing tutorials to tunnel SMB over SSH, the difference being…
-
Good news!
To start off the new year on a happy note, take a look at a list containing some of the things accomplished in the fight against spammers during the year 2008: 2008: A Significant Year In The Fight Against Illegal Spammers
-
Detecting user-mode debuggers under Windows
The packer-unpacker game is a game that I disapprove of, however this doesn’t stop me from documenting a trick I remembered after reading the following blog post: Anti-Debugging Series – Part II. To detect if a user mode debugger is attached to your process, do the following steps: Allocate some memory with HeapAlloc. Write something…
-
Anonymous browsing is hard
From the “big fricking surprise department” comes the news that “private browsing is hard to implement“. Well, duh! Also, quite obvious: the biggest problem were “Flash cookies” – again, duh!, since they are stored outside of the browser, so there is not very much the browser can do about them. There are many ways users…
