You are here |
componenthouse.com | ||
| | | |
connorberry.com
|
|
| | | | Language Comparison Perl: while (<>) { print "$. : $_" } Perl: while (<>) { print "$. : $_" } CSharp: using System; using System.IO; class App { public static void Main(string[] args) { int line_number = 1; foreach (string arg in args) { foreach (string line in File.ReadLines(arg)) { Console.WriteLine(line_number + ":" + line);... | |
| | | |
studiofreya.org
|
|
| | | | ||
| | | |
badoption.eu
|
|
| | | | ZipJar, a little bit unexpected attack chain The upcoming from the .zip TLDs from Google brought some discussion about attack vectors. Most of those attack vectors are not completely new, like using an "@" to split between username and host. While playing a little bit around, an unexpected attack chain appeared, involving a .zip TLD, Windows Explorer, WebDAV and a jar file. Some further reading and research: https://www.kaspersky.com/blog/zip-mov-domain-extension-confusion/48254/ https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse https://mrd0x.com/file-archiver-in-the-browser/ | |
| | | |
thedulinreport.com
|
|
| | Reading about well respected people who shun management roles reaffirms my long-term goal of becoming a trusted adviser or a chief technologist to a visionary business leader. In my mental exercises I've come up with several scenarios of accomplishing this. |