Pages:
- About
- About the Advertisements
- Activity
- Blog
- Books
- Bucketlist
- Cybersecurity
- Explore
- Explore (Legacy)
- Food
- Happiness
- Home
- Honeytrap
- Humor
- Information Security
- Inputs
- Inspiration
- IP
- Jokes
- Lifestyle
- Login
- Media
- Members
- Movies
- Music
- Payment Confirmation
- Popular
- Privacy
- Projects
- An Atheist Debate Reference
- An Information Security Glossary of Terms
- Book Summaries
- Book Summary: Fall
- Summary : Waking Up
- Summary: Algorithms to Live By
- Summary: Amusing Ourselves to Death
- Summary: Atlas Shrugged
- Summary: Atomic Habits
- Summary: Blue Team Field Manual
- Summary: Capital and Ideology
- Summary: Capital in the Twenty-First Century
- Summary: Coming Apart
- Summary: Enlightenment Now
- Summary: Fire and Fury
- Summary: Flowers for Algernon
- Summary: Homo Deus
- Summary: Human Hacking
- Summary: Influence — The Psychology of Persuasion
- Summary: Left of Bang
- Summary: Lord of the Flies
- Summary: Metamorphosis of Prime Intellect
- Summary: Naked Economics
- Summary: Naked Statistics
- Summary: Never Split the Difference
- Summary: Noise, a Flaw In Human Judgement
- Summary: Rework
- Summary: Sapiens
- Summary: Sleeping Giant
- Summary: Spent
- Summary: Style: Lessons in Clarity and Grace
- Summary: The 21 Immutable Laws of Marketing
- Summary: The Age of Surveillance Capitalism
- Summary: The Dichotomy of Leadership
- Summary: The Graveyard Book
- Summary: The Inevitable — Understanding the 12 Technological Forces That Will Shape Our Future
- Summary: The Infinite Game
- Summary: The Pentester’s BluePrint
- Summary: The Power of Less
- Summary: The Stranger
- Summary: The Subtle Art of Not Giving a F**k
- Summary: The Tyranny of Metrics
- Summary: The War on Normal People
- Summary: The Wisdom of Psychopaths
- Summary: Uncertainty
- Summary: Willpower
- Summary: Zealot
- The UL Book Club
- Concepts
- CTF Solution Reference
- Grammar
- Ideas
- The GT Rating System
- Web Application Security Testing Resources
- Quotes
- Recommended
- Restaurants
- Site Archives
- Sitemap
- Start Here: How to Explore the Site
- Subscribe
- Subscribe Complete
- Technology
- Thank You For Your Support
- The Unsupervised Learning EDC Setup
- The Unsupervised Learning Newsletter
- The Unsupervised Learning Podcast
- This is a secret directory…
- Tutorials
- 60 Cybersecurity Interview Questions [2019 Update]
- A
ffuf
Primer - A Beer Primer
- A Bettercap Tutorial — From Installation to Mischief
- A Blockchain Primer
- A Business Writing Primer
- A Class Primer
- A Coffee Primer
- A CrowdSec Primer: A Modern Replacement for Fail2Ban
- A DNS Primer
- A find Tutorial and Primer
- A git Primer
- A grep Tutorial and Primer
- A Hiring Primer
- A Leadership Primer
- A Null Pointer Dereference Primer
- A Relativity Primer
- A Security-focused HTTP Primer
- A Shodan Tutorial and Primer
- A Siri Primer and Reference
- A Steak Primer
- A Subnetting Primer
- A tar Primer
- A tcpdump Tutorial with Examples — 50 Ways to Isolate Traffic
- A Tea Primer
- A tr Primer
- A Typography Primer
- A Unix and Linux Permissions Primer
- A USB-C Primer
- A Varnish Primer
- A Web Performance Primer
- A Wine Primer
- Alfred
- amass — Automated Attack Surface Mapping
- An Agile Primer
- An Artificial Intelligence Primer
- An Audio Quality Primer
- An Encoding Primer
- An ICMP Reference
- An ICS/SCADA Primer
- An Information Security Metrics Primer
- An IPTABLES Primer
- An lsof Primer
- An MVC Primer
- An Ngrok Tutorial and Primer
- An NMAP Primer
- An SEO Primer
- Big-O Notation Explained
- Building Yourself a DMZ
- Correlation vs. Causation
- Diffie-Hellman
- Dining
- Drinking
- EDM Types
- Encoding vs. Encryption
- Ettercap
- Firewalls
- Generating Power in Your Loops
- Glossary
- Hashing vs. Encryption vs. Encoding vs. Obfuscation
- Hexedit
- Hiding Your IP
- How to Build Spoiler Protection in your HTML
- How to Remember Your TCP Flags
- How to Set a Static IP Address in Linux
- How to Set Your IP in Linux
- Information Security Assessment Types
- Information Security Concepts
- Information Security Definitions
- Learn Vim For the Last Time: A Tutorial and Primer
- Masscan Examples: From Installation to Everyday Use
- Mobile (Cellular) Technologies Explained
- Multi-dimensional Vulnerability Hierarchies
- My Ümlaut Page
- Network Ports
- Not All SYNs Are Created Equal
- P vs. NP Explained
- Philosophy
- Photography
- Politics
- Positional Number Systems
- Postfix
- Practical Security Principles
- Programming
- Public Vulnerability Database Resources
- Same Origin Policy
- Secrecy (Obscurity) is a Valid Security Layer
- Serialization Security Bugs Explained
- Tactical
tmux
: The 10 Most Important Commands - The Birthday Attack
- The Carriage Return and Line Feed Characters
- The Definition of a Purple Team
- The Difference Between a Programmer, Developer, and a Hacker
- The Difference Between a URL, URI, and a URN
- The Difference Between a Vulnerability Assessment and a Penetration Test
- The Difference Between Events, Alerts, and Incidents
- The Difference Between Fedora, Redhat, and CentOS
- The Difference Between Red, Blue, and Purple Teams
- The Difference Between Stack and Heap Based Memory
- The Difference Between System V and SystemD
- The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
- The Hyperlink Trailing Slash
- The IMAP IDLE Command
- The Internet, the Deep Web, and the Dark Web
- Wardrobe
- What Matters More for Acceleration: Horsepower or Torque?
- Whiskey
- Zone Transfer Primer
- Unsupervised Learning Sponsorship
- Uses
- Videos
- Adaptive Testing Methodology [ATM]
Categories:
- Business
- Creativity
- Culture
- Information Security
- Lifestyle
- Meaning
- Miscellaneous
- Personal
- Philosophy
- Politics
- Science
- Technology
Monthly:
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- December 2004
- November 2004
- October 2004
- September 2004
- August 2004
- June 2004
- May 2002
- December 1999
- November 1999
- September 1997
- July 1997
- June 1997
- April 1997
- February 1997
- January 1997
- December 1996
- November 1996
- October 1996
Recent Posts:
- Why I’m Not Worried About Elon Musk Buying Twitter
- Disappointed in Scott Galloway
- Removing ^M Characters
- A Quick Thought on Musk Buying Twitter
- My Custom Contact Sharing Solution
- The Actual Pronunciation of GIF, from the Creator
- How to Disagree
- Thinking About the Future of InfoSec (v2022)
- Google Has Opened the Door To Cloudflare
- A Quick Thought on Removing Daylight Saving(s)
- How to Tell the Difference Between a Legitimate NFT and a Rug Pull
- Things I Do Immediately on a New Linux Box
- Not All MFA is Equal, and the Differences Matter a Lot
- The Anti-Putin Narrative Could Have Gone Very Differently
- Crypto is Exciting Because It Changes Incentives
- A Disturbing Idea About Business and Human Workers
- Candles, Crypto, and Electricity
- Our Return to Normal Shows Risk is Mostly Psychological
- My Favorite Vim Commands in Chrome
- The Rise of White Extremism in the US, Canada, and Europe
- Thoughts on Rogan and Redemption
- The Irony of InfoSec’s Reaction to Crypto, NFTs, and Web3
- How to Get The Current Day in Google Analytics
- Is This the Most Important Civilizational Pattern?
- Consciousness is a Movie Screen Without an Audience, Theater, or Universe
- Your Value Comes From Your Output
- Gaming is Metaverse 1.0
- Losers Exist, Don’t Hire Them
- My Predictions for Crypto
- A Correction is Coming, and That’s Ok
- What to Do Instead of New Years Resolutions
- Comparing My Top Four Security Podcasts/Newsletters
- The Subsequent Waves of log4j Vulnerabilities Aren’t as Bad as People Think
- The Vigilant
- NFTs Are Digital Signaling
- A Note to the UL Community on Thanksgiving
- The Rittenhouse Trial
- Why The Metaverse Will Succeed
- Degrees and Credentials in InfoSec
- Thoughts on Facebook Meta
- Wokeism Will Elect Trump in 2024
- Some Quick Thoughts on Crypto (October 2021)
- Opiates and Social Media Are Symptoms, Not Causes
- Thoughts on Vaccine Mandates
- Weakness and Evil
- Podcast Setup Update (October 2021)
- Is-Ought, and the Ship of Theseus
- It’s Time for Vendor Security 2.0
- Thoughts on the OWASP Top 10 2021
- Amazon is Capitalism
- A Solution to the Ship of Theseus
- Geeking Out on Air Quality Measurement
- What if Our Problems Aren’t Tech Problems?
- Random Thoughts on China’s Model vs. America’s
- Fixing the “Not Responding” Error on the Logitech Circle View Doorbell
- The EM Wave of Crisis and Appreciation
- Why is the NYTimes So Down on the US and the West?
- Apple’s Privacy Misstep
- I’m So Very Sad About Afghanistan
- Machine Learning is Pattern Matching For Things That Matter to Humans
- What Happened to the IDW?
- Patterns in UL Member Daily Routines
- The Strange World of “Good Enough” Fencing
- Everything is K-Shaped Right Now
- How to Improve Vaccination Rates Using a Conspiracy
- Associate With Grinders
- Dead Drops and Security Through Obscurity
- The Presenting Vendor Paradox
- Getting Good
- Lens vs. List Learning
- Reality and Meaning
- How I Knew Stadia (And Similar Products) Would Fail
- How I Organize my RSS Feeds, 2021 Edition
- Why an NTSB Wouldn’t Be Helpful For Ransomware
- Analysis of the 2021 Verizon Data Breach Report (DBIR)
- My Current Thoughts on Cryptocurrency | May 2021
- The GOP Has Chosen Unity Behind a Lie Rather Than Facing the Truth
- Sustainable Content Creation
- A Summary of Balaji Srinivasan’s Thoughts on the Future
- The New Unsupervised Learning Logo (2021)
- Explaining Threats, Threat Actors, Vulnerabilities, and Risk Using a Real-World Scenario
- Thinking About Different Types of Digital Value Exchange
- A Dogecoin Primer
- 4 Writing Styles I Admire
- How to Avoid Losing Another Generation of Artists, Inventors, and Builders
- What if We Made Paying Ransoms Illegal?
- Frontview Mirror | 2021 Edition
- Disambiguating Mass Shootings
- How to Use Feedly to Follow Content on Twitter
- The Consumer Authentication Strength Maturity Model (CASMM) V6
- Look and Feel Matter More Than Ever for Content Creators
- 2 Reasons Active Will Replace Passive as the Future of HiFi
- Chart Scale Types
- How Raising the Minimum Wage Can Accelerate Human Job Loss to Automation
- The Relative Importance of High-Resolution Audio, CD Quality, and MQA
- We Were Very Wrong About Testosterone
- Digitally Imported High Quality Station URLs
- The Ways We Deceive Ourselves
- Levels of Joy (Fulfillment)
- My Journey to Beginner Audiophile