Skip to content


  1. iOS 5 Trusted Root Certificates February 27, 2012

    Posted in Security.

    No comments
  2. Defeating cold boot attacks February 26, 2012

    Posted in Security.

    No comments
  3. A flyingpenguin Guide to RSA 2012 February 26, 2012

    Posted in Security.

    No comments
  4. We Won the TSA Slogan Competition February 23, 2012

    Posted in Poetry, Security.

    No comments
  5. vCloud Health Assessment with VCM February 23, 2012

    Posted in Security.

    No comments
  6. EFF: Historical Facts are not Property February 23, 2012

    Posted in History, Security.

    No comments
  7. Using APIs to identify VMs February 23, 2012

    Posted in Security.

    No comments
  8. Identification of Oakland Riot Police February 22, 2012

    Posted in Security.

    No comments
  9. Metasploit 4.2 release: Brute force of vSphere API February 22, 2012

    Posted in Security.

    No comments
  10. RSAC 2012: Interview with Bruce Schneier about his new book, Liars and Outliers February 19, 2012

    Posted in Security.

    No comments
  11. OC Healthcare Breach Response Example February 17, 2012

    Posted in Security.

    No comments
  12. SL33 Catamaran February 13, 2012

    Posted in Sailing, Security.

    No comments
  13. Nokia N9 Operator Logo Hack February 13, 2012

    Posted in Security.

    No comments
  14. Disaster Recovery for VMware View and vCloud Director February 13, 2012

    Posted in Security.

    No comments
  15. Changing VCVA SSL Certificates February 12, 2012

    Posted in Security.

    No comments
  16. Congress: Cyber Security & the Private Sector. FBI Hacked February 12, 2012

    Posted in Security.

    No comments
  17. The Right to a Mitigative Counterstrike February 11, 2012

    Posted in Security.

    No comments
  18. History and Programming Languages February 11, 2012

    Posted in History, Security.

    No comments
  19. Starry Night: Animated February 11, 2012

    Posted in History, Poetry.

    No comments
  20. Monitoring Cloud Availability with Twitter February 11, 2012

    Posted in Security.

    No comments
  21. “Only the one who dies, truly lives” February 10, 2012

    Posted in History, Security.

    No comments
  22. PA-DSS Program Guide v2.0 February 10, 2012

    Posted in Security.

    No comments
  23. Breach Analysis: Grizzly Bear Edition February 9, 2012

    Posted in Food, Security.

    No comments
  24. VMware PEX 2012: Security and Compliance February 9, 2012

    Posted in Security.

    No comments
  25. VMware and PCI QSAs February 8, 2012

    Posted in Security.

    No comments