|
You are here |
stafwag.github.io | ||
| | | | |
www.michaelcrump.net
|
|
| | | | | Learn how to share files from the command line | |
| | | | |
coornail.net
|
|
| | | | | A recent Hacker News thread got me to revisit my dotfiles repository and reflect on the tools I've been using for the past 10+ years. Technologies like the cloud and docker came, but surprisingly nothing major has changed in these years. | |
| | | | |
wsummerhill.github.io
|
|
| | | | | A little demo walk through I made of a Linux Ret2Libc style buffer overflow to bypass DEP stack protections which is featured in the Sans GXPN course and certification. | |
| | | | |
karazajac.io
|
|
| | | To manage a successful Enterprise Cybersecurity Program (ECSP), a Chief Information Security Officer (CISO) must balance several constraints and many cyber threats against their organization. | ||