Posts:
-
Weekly Rundown – Week 49 2017
Newsworthy Donkey Car – “DIY Self DDriving car platform for small scale cars” – Very interesting open source framework for autonomous RC. 1st Text Message was sent 25 years ago – Time flies when you’re having fun Samsung 5G moving train test hit 1.7Gbps peak speed – Getting Sonic the Hedgehog speeds at Sonic the…
-
Weekly Rundown – Week 48 2017
Previously, an idea was established for the “Daily” category but realistically it isn’t feasible to produce something daily that warrants reading. This segment is basically what the title implies, a weekly rundown of things that were of particular interest to yours truly.
-
HomeLab Migration
Last episode on lab work I fixed networking issues, this can be found here. This is what my “completed” lab looks like that I do testing with at work, the network can be interpreted pretty easily but if I remember I am going to include a network diagram of sorts for this as some might…
-
QuantiPy
This is a little bit of an offshoot from my normal posts and rather is an idea for a program of sorts that would be a quantification of how time is spent at a computer for better or for worse. This would help identify patterns and provide a single page overview of how a day…
-
WPA2 is Broken – KRACK
The HOT new trend is to name the vulnerability that was found with a cool catchy name (CVE’s just don’t cut it anymore), this one holds the name “KRACK”. Other notable vulnerabilities that were named other than this one being Heartbleed, Badlock and ImageTragick. The embargo on this vulnerability broke at 6AM EST, 10/16/2017 and…
-
Flight Log 10-03-17
It’s been a little while,
-
Instagram 2 Factor Authentication is Broken
Reviewing some security settings on everyone’s favorite photo sharing app revealed to me some inadequacies in the security policy and implementation of Instagram. Realizing that the setting lay dormant in my account information I decided to go ahead and implement what Instagram calls 2 factor authentication. Doing so didn’t prompt me to scan a QR…
-
Flight Log 5-5-17
-
Distributed social networking using old protocols
We live in a very interesting time, a time in which we have access to more information than ever and the ability to broadcast a message or information to more people than ever. This comes with a laundry list of pros but something that has always been confusing to me has been that the web…
-
Threat model analysis: inmates with homebrew equipment
One of the first headlines that came across my feed today read as the title of this post does, “Investigation finds inmates built computers and hid them in prison ceiling”. Archive.org Link Immediately after reading this the following thoughts went through my head How could IT be so unaware of these ethernet lines running directly…
Got any book recommendations?