|
You are here |
a3nm.net | ||
| | | | |
whynothugo.nl
|
|
| | | | | ||
| | | | |
stuvel.eu
|
|
| | | | | This article was originally written in March 2008. Setting up Squid as a transparent HTTP proxy has been discussed plenty of times. All of these examples and blogs I've read on the subject assume that you run Squid on your network gateway. | |
| | | | |
chollinger.com
|
|
| | | | | In this article, I'll document my process of building a home server - or NAS - for local storage, smb drives, backups, processing, git, CD-rips, and other headless computing... | |
| | | | |
notsosecure.com
|
|
| | | In this blog post we will discuss a case study where we were successful in exploiting a faulty password reset functionality. The end result was that we were able to set a newpassword onany arbitrary user account. We could do this because of a weak cryptographic implementation, in this case the functionality was utilising Electronic Code Book (ECB) mode encryption. | ||