Reading time:
~13 min
Posted
by Dane Goodwin
on
24 October 2018
Intro Laptop hardening is difficult at the best of times, and it’s made worse by the conflicting requirements we have...
Reading time:
~3 min
Posted
by Dane Goodwin
on
27 March 2016
When assessing web applications, we typically look for vulnerabilities such as SQLi and XSS, which are generally a result of...
Reading time:
~1 min
Posted
by Haroon Meer
on
01 October 2007
Royal pingdom did a quick check on what was running at some of the more popular sites on the Internet...
Reading time:
~2 min
Posted
by Haroon Meer
on
20 August 2007
I suspect somewhere there exist cardinal rules of blogging which would state that using a single post to make 2...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
08 August 2007
Spock have just opened up beyond their private beta and promise to be the most comprehensive people search tool on...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
16 July 2007
Google have finally revised their cookie expiration policy, which will have user cookies expiring after 2 years. (For those of...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
16 July 2007
hmmm… i have heard this somewhere before…. ” However, in cases where your finger is used to identify or authenticate...
Reading time:
~2 min
Posted
by Haroon Meer
on
11 July 2007
Someone in the office was discussing Microsoft’s recent horrible foray into the anti-virus market. Apparently an online source held one-care...