Archives
- 15 Nov My conversation with a shy Trump voter taught me why Harris lost
- 19 Oct A quick Search Engine Optimization (SEO) Guide
- 13 Oct Hava Laudon spouts a false anti-LGBT conspiracy theory to justify evangelical christian control of public education
- 26 Aug Ghidra workflow
- 25 Aug x86 assembly code basics for reverse engineers
- 25 Aug Beginning malware analysis
- 21 Aug Ghidra setup guide
- 19 Aug How to build a malware analysis lab
- 19 Aug Free resources for malware researchers
- 19 Aug How to add a Keybase proof to a Jekyll static website
- 17 Aug Trump Tweets + Analysis = Art?
- 16 Aug Introducing wp2jekyll: A new way to migrate from WordPress to Jekyll
- 12 Aug My painful but worthwhile migration from WordPress to Jekyll
- 11 Jan How to comply with Google and Yahoo's requirements for bulk email senders
- 23 Dec SEIMs and Other Forensic Tools Vulnerable to Log4j Exploits
- 24 Nov How to update the firmware on a Samsung monitor
- 06 Oct How to Install Volatility 2 and Volatility 3 on Debian, Ubuntu, or Kali Linux
- 22 May How to use Farsight Security's DNSDB to harness the power of passive DNS
- 14 May An introduction to DNS
- 10 May How to examine a credential harvesting page using Microsoft Edge
- 26 Feb How to configure a nginx reverse proxy with Let's Encrypt certificates
- 13 Jan How the Parler data was legally acquired by activists
- 30 Apr Ohio's absentee ballot system disenfranchises disabled voters. Let's fix that before November.
- 27 Aug How to forward a forensic copy of an email as an attachment
- 27 Aug How to view email headers
- 04 Jun Proofpoint is requiring their customers to pay for Email Fraud Defense to get aggregate DMARC data from their gateways
- 25 Jan Emotet malspam campaign exploits reliance on magic for file type detection
- 29 Nov How to inspect the certificate of a mail server over a CLI
- 15 Jun Demystifying DMARC: A guide to preventing email spoofing
- 04 Jun How to compile and install FFmpeg on Debian/Ubuntu
- 10 Feb Stop the ADA Education and Reform Act
- 01 Jan Lessons Learned from the US Federal Government's Ongoing Deployment of SPF and DMARC
- 15 Jun How to install YARA and write basic YARA rules to identify malware
- 11 Jun How to run graphical Linux applications on Windows 10 using the Windows Subsystem for Linux (WSL) 1.0
- 18 May WannaCry ransomware analysis: Samples date back to at least early February 2017
- 23 Oct Google Pixel phones can be unlocked with a recording of a trusted voice by default
- 20 Oct Android 7.1 adds native android visual voicemail support for Verizon
- 09 Sep PSA: The latest Google Chrome release trips EMET's EAF+ mitigation
- 23 Aug HHS: Ransomware encryption of ePHI is a HIPAA breach
- 21 Aug Prevent ransomware from succeeding with strategic defense-in-depth
- 20 Mar DoJ v. Apple: It's all about the precedent