Archive | tumblr RSS feed for this section
Recent Posts
- Bill “doom” Belichick
- Randy Pausch Last Lecture 10 Years Later
- Skill Acquisition for Soccer Success with Tom Byer, Will Lead to Player Development
- World-Changing Architect of Tomorrow – Elon Musk’s ‘Scientific Method’
- Strawweight Title Quote from UFC 217
- Chicago Cubs 2003 Memories
- Before the Flood via National Geographic
- Matt Fraser’s Addition to Suffering
- The Tricky Part…
- Cryptography Challenge – Collision (Medium): National Cyber League (NCL) 2015 Postseason
Categories
- Adjunct (31)
- Art (14)
- BackTrack (3)
- CCC (2)
- CentOS (3)
- Conference Talk (13)
- CrossFit (1)
- Demo (10)
- Documentary (4)
- En Español (2)
- Environment (1)
- Galaxy (2)
- History (1)
- HOWTO (19)
- Internet Explorer (2)
- Java (2)
- Kali (12)
- Learning (31)
- Metasploit (3)
- Microsoft (2)
- NCL (7)
- Patching (9)
- SoT (46)
- Stanford University (1)
- Students (8)
- TED (6)
- tumblr (1)
- Ubuntu (3)
- Vimeo (6)
Archives
- February 2018
- December 2017
- November 2017
- November 2016
- August 2016
- December 2015
- November 2015
- August 2015
- May 2015
- December 2014
- November 2014
- October 2014
- September 2014
- February 2014
- June 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- September 2012
- August 2012
- March 2012
- January 2012
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
« Feb | ||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Tags
0-day
28c3
29c3
BackTrack
backup
bash
CentOS
Cisco
code year
Cryptography
Decision Making
DNS
error
FireWire
helical model
HP
IE
incepiton
java
Kali
mac os x
masscan
metasploit
Microsoft
Microsoft Black Tuesday
network scanning
nmap
OPEN
password cracking
patching
PIPA
programming
python
SET
SOPA
spanish
street photographer
tool
upgrade
vortex
vulnerability
WDE
Wireshark
write-up
yum
Recent Tweets
- New macOS zero-day, currently no PoC. https://t.co/usSM8CXUNW 6 years ago
- “The exploit is highly efficient because the malicious app doesn't need admin access to retrieve passwords from the… https://t.co/wb3xu9MWL2 6 years ago
- There is no way of telling whether this security flaw has been actively used or not, best practice is to assume tha… https://t.co/v3vBjImZTN 6 years ago
- You can see which version of Kubernetes your nodes are running by running: kubectl get nodes. Your output tells you… https://t.co/vYrqpHsDv7 6 years ago
- Kubernetes CVE-2018-1002105 allows any authenticated user to get administrative access to the cluster (using standa… https://t.co/lqv0HcFbWH 6 years ago