comeandtakeit.net
Max Boot’s The Lessons of Five Thousand Years (of Guerrilla Warfare) | Come and Take It
http://www.comeandtakeit.net/2014/08/17/max-boots-articles-of-insurgency
Come and Take It. If I owned Hell and Texas, I would farm out Texas and live in Hell. Max Boot’s The Lessons of Five Thousand Years (of Guerrilla Warfare). 1 Guerrilla warfare has been ubiquitous and important throughout history. 2 Guerrilla warfare is not an “Eastern Way of War; it is the universal way of war. 3 Guerrilla warfare has been both underestimated and overestimated. 4 Insurgencies have been getting more successful since 1945 but still lose most of the time. And it was very good. I recomme...
comeandtakeit.net
Software Vault | Come and Take It
http://www.comeandtakeit.net/software-vault
Come and Take It. If I owned Hell and Texas, I would farm out Texas and live in Hell. Rapid 7 Security Street. SANS Internet Storm Center. Proudly powered by WordPress.
comeandtakeit.net
Schneier’s Five Questions | Come and Take It
http://www.comeandtakeit.net/2012/01/30/schneiers-five-questions
Come and Take It. If I owned Hell and Texas, I would farm out Texas and live in Hell. Schneier’s Five Questions. I just read Bruce Schneier’s Beyond Fear. Step1: What assets are you trying to protect? Step2: What are the risks to the assets? Step3: How well does the security solution mitigate those risks? Step4: What other risks does the security solution cause? Step5: What costs and trade-offs does the security solution impose? This entry was posted in Uncategorized. January 30, 2012.
troysunix.blogspot.com
troy's unix space: February 2013
http://troysunix.blogspot.com/2013_02_01_archive.html
Various tips and tricks picked up in UNIX engineering. Intro SmartOS Setup pt 4. Following up from part 3. Where we installed and configured our SmartOS. Host (cn40), we now get to start checking out handling and management. Of SmartOS OS VMs (SOSVMs). Jumping in where we left off in part 3, we. Start with the configuration for our image repository hosted on serv1. Links to this post. Intro SmartOS Setup pt 3. I detailed our general expectations and in part 2. Check out our first SmartOS. Particularly us...
troysunix.blogspot.com
troy's unix space: Configuring AutoFS in Linux
http://troysunix.blogspot.com/2012/08/configuring-autofs-in-linux.html
Various tips and tricks picked up in UNIX engineering. Configuring AutoFS in Linux. This post details simple usage of AutoFS under Linux. The purpose of. AutoFS is to mount volumes as they are needed and unmount them when. They are not in use. This is useful for sharing out home directories,. Documentation, or applications to clients from a NAS cluster as well. As presenting standardized directory structures wherein the directory. Structure of origin may not be standard. Both of which will be covered.
synfulpacket.blogspot.com
SYNful Packet: October 2006
http://synfulpacket.blogspot.com/2006_10_01_archive.html
Musings on computer and network security, computer and network administration, Linux, *BSD, UNIX, and the occasional off-topic rant. Email rfifarek at gmail dot com. Wednesday, October 11, 2006. Fedora Core 5 (FC5) and VMWare Server. Or if you are running an SMP kernel:. And then point the vmware-config.pl script to:. Lib/modules/[your kernel version here]/build/include/linux. Where [your kernel version here] is the output of:. As an example, at the time I write this, the directory would be:. This also m...
low-level.blogspot.com
Uneventful Rantings: 03/01/2007 - 04/01/2007
http://low-level.blogspot.com/2007_03_01_archive.html
Friday, March 30, 2007. In case anyone happens to have to manage a fairly large VPN hub server running IOS, here's. Something very useful for troubleshooting. As of IOS 12.3, you can set conditional filters for debugs based on varying criteria most notably the peer id or user id (XAuth complaining! So you can see what's exactly going without being confused with other sessions that are working fine. Windows Vista upgrade path. Here's a helpful guide. Thursday, March 29, 2007. New Job = More Money?
nealkrawetz.com
The Hacker Factor Blog
http://www.nealkrawetz.com/blog
The Hacker Factor Blog. Tools, Techniques, and Tangents. Writes The Hacker Factor Blog. Follow him on Twitter. 8226; How Not to do Image Analysis Part I. 8226; Looks Like It. 8226; Body By Victoria. 8226; Direct Deposit, Direct Withdrawl. 8226; Point-of-Sale Vulnerabilities. Test your own photos. Math with Bad Drawings. Sunday, 21 August 2016. I have a small counter in the lower right corner. It lists the number of banned systems. Some of those bans come from users who violated the terms of servi...The H...
ohbrian.blogspot.com
Oh Brian!: Adding Endpoint Defenses in the Browser
http://ohbrian.blogspot.com/2008/08/adding-endpoint-defenses-in-browser.html
The thoughts and ideas of a geek wandering the technological frontier. Welcome to my online note book. You want immediate Security Cred? Thank You to the Watch Prince. Bletchley Park restoration short on funds! Dan says my ISPs DNS is OK. Help me get this Kiva loan funded! Pushing Paper Out the Door - from the NY Times. Schneier says Steal This Wi-Fi. Why America needs Obama. Monday, August 18, 2008. Adding Endpoint Defenses in the Browser. From Long Island, New York, United States.
SOCIAL ENGAGEMENT