Explore >> Select a destination


You are here

stafwag.github.io
| | www.michaelcrump.net
5.2 parsecs away

Travel
| | Learn how to share files from the command line
| | coornail.net
4.7 parsecs away

Travel
| | A recent Hacker News thread got me to revisit my dotfiles repository and reflect on the tools I've been using for the past 10+ years. Technologies like the cloud and docker came, but surprisingly nothing major has changed in these years.
| | wsummerhill.github.io
5.1 parsecs away

Travel
| | A little demo walk through I made of a Linux Ret2Libc style buffer overflow to bypass DEP stack protections which is featured in the Sans GXPN course and certification.
| | karazajac.io
33.4 parsecs away

Travel
| To manage a successful Enterprise Cybersecurity Program (ECSP), a Chief Information Security Officer (CISO) must balance several constraints and many cyber threats against their organization.