Pages:
- About
- About the Advertisements
- Activity
- Blog
- Books
- Bucketlist
- Cybersecurity
- Explore
- Explore (Legacy)
- Food
- Happiness
- Home
- Honeytrap
- Humor
- Information Security
- Inputs
- Inspiration
- IP
- Jokes
- Lifestyle
- Login
- Media
- Members
- Movies
- Music
- Payment Confirmation
- Popular
- Privacy
- Projects
- An Atheist Debate Reference
- An Information Security Glossary of Terms
- Concepts
- CTF Solution Reference
- Grammar
- Ideas
- Summaries
- Book Summary: Fall
- Summary : Waking Up
- Summary: Algorithms to Live By
- Summary: Amusing Ourselves to Death
- Summary: Andrej Karpathy on Lex Fridman’s Podcast (Late 2022)
- Summary: Atlas Shrugged
- Summary: Atomic Habits
- Summary: Blue Team Field Manual
- Summary: Capital and Ideology
- Summary: Capital in the Twenty-First Century
- Summary: Coming Apart
- Summary: Don’t Trust Your Gut
- Summary: Enlightenment Now
- Summary: Fire and Fury
- Summary: Flowers for Algernon
- Summary: Homo Deus
- Summary: Human Hacking
- Summary: Influence — The Psychology of Persuasion
- Summary: Left of Bang
- Summary: Lord of the Flies
- Summary: Metamorphosis of Prime Intellect
- Summary: Naked Economics
- Summary: Naked Statistics
- Summary: Never Split the Difference
- Summary: Noise, a Flaw In Human Judgement
- Summary: Rework
- Summary: Sapiens
- Summary: Sleeping Giant
- Summary: Spent
- Summary: Style: Lessons in Clarity and Grace
- Summary: The 21 Immutable Laws of Marketing
- Summary: The Age of Surveillance Capitalism
- Summary: The Dichotomy of Leadership
- Summary: The Graveyard Book
- Summary: The Inevitable — Understanding the 12 Technological Forces That Will Shape Our Future
- Summary: The Infinite Game
- Summary: The Pentester’s BluePrint
- Summary: The Power of Less
- Summary: The Stranger
- Summary: The Subtle Art of Not Giving a F**k
- Summary: The Tyranny of Metrics
- Summary: The War on Normal People
- Summary: The Wisdom of Psychopaths
- Summary: Uncertainty
- Summary: Willpower
- Summary: Zealot
- The UL Book Club
- The GT Rating System
- Web Application Security Testing Resources
- Quotes
- Recommended
- Restaurants
- Site Archives
- Sitemap
- Sponsoring Unsupervised Learning
- Start Here: How to Explore the Site
- Subscribe
- Subscribe Complete
- Technology
- Thank You
- Thank You For Your Support
- The Unsupervised Learning EDC Setup
- The Unsupervised Learning Newsletter
- The Unsupervised Learning Podcast
- This is a secret directory…
- Tutorials
- 60 Cybersecurity Interview Questions [2019 Update]
- A
ffuf
Primer - A Beer Primer
- A Bettercap Tutorial — From Installation to Mischief
- A Blockchain Primer
- A Business Writing Primer
- A Class Primer
- A Coffee Primer
- A CrowdSec Primer: A Modern Replacement for Fail2Ban
- A DNS Primer
- A find Tutorial and Primer
- A git Primer
- A grep Tutorial and Primer
- A Hiring Primer
- A Leadership Primer
- A Null Pointer Dereference Primer
- A Relativity Primer
- A Security-focused HTTP Primer
- A Shodan Tutorial and Primer
- A Siri Primer and Reference
- A Steak Primer
- A Subnetting Primer
- A tar Primer
- A tcpdump Tutorial with Examples — 50 Ways to Isolate Traffic
- A Tea Primer
- A tr Primer
- A Typography Primer
- A Unix and Linux Permissions Primer
- A USB-C Primer
- A Varnish Primer
- A Web Performance Primer
- A Wine Primer
- Alfred
- amass — Automated Attack Surface Mapping
- An Agile Primer
- An Artificial Intelligence Primer
- An Audio Quality Primer
- An Encoding Primer
- An ICMP Reference
- An ICS/SCADA Primer
- An Information Security Metrics Primer
- An IPTABLES Primer
- An lsof Primer
- An MVC Primer
- An Ngrok Tutorial and Primer
- An NMAP Primer
- An SEO Primer
- Big-O Notation Explained
- Building Yourself a DMZ
- Correlation vs. Causation
- Diffie-Hellman
- Dining
- Drinking
- EDM Types
- Encoding vs. Encryption
- Ettercap
- Firewalls
- Generating Power in Your Loops
- Glossary
- Hashing vs. Encryption vs. Encoding vs. Obfuscation
- Hexedit
- Hiding Your IP
- How to Build Spoiler Protection in your HTML
- How to Remember Your TCP Flags
- How to Set a Static IP Address in Linux
- How to Set Your IP in Linux
- Information Security Assessment Types
- Information Security Concepts
- Information Security Definitions
- Learn Vim For the Last Time: A Tutorial and Primer
- Masscan Examples: From Installation to Everyday Use
- Mobile (Cellular) Technologies Explained
- Multi-dimensional Vulnerability Hierarchies
- My Ümlaut Page
- Network Ports
- Not All SYNs Are Created Equal
- P vs. NP Explained
- Philosophy
- Photography
- Politics
- Positional Number Systems
- Postfix
- Practical Security Principles
- Programming
- Public Vulnerability Database Resources
- Same Origin Policy
- Secrecy (Obscurity) is a Valid Security Layer
- Serialization Security Bugs Explained
- Tactical
tmux
: The 10 Most Important Commands - The Birthday Attack
- The Carriage Return and Line Feed Characters
- The Definition of a Purple Team
- The Difference Between a Programmer, Developer, and a Hacker
- The Difference Between a Vulnerability Assessment and a Penetration Test
- The Difference Between Events, Alerts, and Incidents
- The Difference Between Fedora, Redhat, and CentOS
- The Difference Between Red, Blue, and Purple Teams
- The Difference Between Stack and Heap Based Memory
- The Difference Between System V and SystemD
- The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
- The Hyperlink Trailing Slash
- The IMAP IDLE Command
- The Internet, the Deep Web, and the Dark Web
- The Real Difference Between a URL and a URI
- Wardrobe
- What Matters More for Acceleration: Horsepower or Torque?
- Whiskey
- Zone Transfer Primer
- Uses
- Videos
- Adaptive Testing Methodology [ATM]
Categories:
- Business
- Creativity
- Culture
- Information Security
- Lifestyle
- Meaning
- Miscellaneous
- Personal
- Philosophy
- Politics
- Science
- Technology
- Unsupervised Learning
Monthly:
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- December 2004
- November 2004
- October 2004
- September 2004
- August 2004
- June 2004
- May 2002
- December 1999
- November 1999
- September 1997
- July 1997
- June 1997
- April 1997
- February 1997
- January 1997
- December 1996
- November 1996
- October 1996
Recent Posts:
- The AI Attack Surface Map v1.0
- AI Influence Level (AIL) v1.0
- AI’s Next Big Thing is Digital Assistants
- Universal Business Components (UBC)
- The Right Amount of Trauma
- Pre and Post-LLM Software
- AI is a Gift to Transparency
- How to Get the OBS Studio Virtual Cam to Work in Discord on Mac
- Moloch: The Most Dangerous Idea
- The Hierarchy of Content
- AI’s Threat to Newsletters
- Don’t Fix Things; Build Pipelines
- The Pre-AI World, the Post-AI World, and the Gap In-between
- AI is the End of Tutorial Webpages
- Unmasking Money and Power with AI
- AI Revolutionizes Infosec
- import alignment: A Library-based Approach to AI Alignment
- 6 Phases of the Post-GPT World
- Response Shaping: How to Move from AI “Prompts” to AI Whispering
- Calling Out The Security Community on AI
- What’s My Bar for AGI? A Stand-up Comedy Routine
- Yes, GPTs Actually Understand
- SPQA: The AI-based Architecture That’ll Replace Most Existing Software
- Is Equality Unnatural?
- The Primary Liberal vs. Conservative Disconnect
- How AI is Eating the Software World
- How to Access ChatGPT via Voice Command (Using Siri)
- Custom Models Are AI’s Killer App
- What Made the 90’s So Awesome?
- The 2 Current Major AI Bottlenecks
- Your Experience is Your Creativity
- OpenAI’s Purpose is to Build AGI, and What That Means
- AI Art Hack: Combining Abstract Designs with Objects
- Frontview Mirror: 2023 Edition
- My Answer to the “ChatGPT Isn’t Really Creative” Argument
- My Philosophy and Recommendations Around the LastPass Breaches
- Would You Put AI Art In Your House?
- GPT and Search
- How to Survive and Thrive in a World Where AI Can Do Almost Everything
- The UL Boost Protocol
- Napkin Ideas Around What Changes to Expect Post-ChatGPT
- Companies as Alaskan Fishing Boats
- AI is About to Feel Like AGI, and You Need to Get Ready
- AI Art Just Opened The Threat to Human Work We Were Expecting from AGI
- My Prediction For Twitter
- Twitter’s Blue Checkmark Strategy Reduces Trust in Pursuit of Revenue
- Reverse Transcription
- Why Apple Keeps Winning
- Podcast Audio Quality: AI-based Post-processing vs. Hardware
- Humiliation is Deadly
- AI Art Will Push the Top 1% to Human Artists
- Generate AI Art Using Your Own Writing
- Something is Up With Meritocracy
- Stadia is Google’s Product Strategy
- 5 Things I’m Still Waiting for With the iPhone, Apple Watch, and AirPods
- Using Custom Searches in Safari (in 2022)
- My Mom Died on Saturday
- Metagaming: An Interview With Andrew Ringlein
- Battle of The AI Art Engines: Midjourney vs. DALL-E
- Supporting Sam Harris on Company Autonomy
- Creativity Comes from Idleness
- Why I’m OK With Amazon Buying One Medical
- Principals vs. Agents | Sam Harris and Marc Andreessen
- A Bourgeoisie Primer
- My Ultimate Zsh and Vim Config [ July 2022 Version ]
- The Workforce Pincer Move During Recessions
- Two Americas
- L33t H4cking vs. M0st H4acking
- The Cybersecurity Skills Gap is Another Instance of Late-stage Capitalism
- Why Everyone Needs a Blog
- How Good is DALL·E 2 at Creating NFT Artwork?
- Just Copy What Works
- Newsletter Analysis: What My Favorite Newsletters Have in Common
- How Much Incel Terrorism Can We Prevent With Kindness?
- Why I’m Not Worried About Elon Musk Buying Twitter
- Disappointed in Scott Galloway
- Removing ^M Characters
- A Quick Thought on Musk Buying Twitter
- My Custom Contact Sharing Solution
- The Actual Pronunciation of GIF, from the Creator
- How to Disagree
- Thinking About the Future of InfoSec (v2022)
- Google Has Opened the Door To Cloudflare
- A Quick Thought on Removing Daylight Saving(s)
- How to Tell the Difference Between a Legitimate NFT and a Rug Pull
- Things I Do Immediately on a New Linux Box
- Not All MFA is Equal, and the Differences Matter a Lot
- The Anti-Putin Narrative Could Have Gone Very Differently
- Crypto is Exciting Because It Changes Incentives
- A Disturbing Idea About Business and Human Workers
- Candles, Crypto, and Electricity
- Our Return to Normal Shows Risk is Mostly Psychological
- My Favorite Vim Commands in Chrome
- The Rise of White Extremism in the US, Canada, and Europe
- Thoughts on Rogan and Redemption
- The Irony of InfoSec’s Reaction to Crypto, NFTs, and Web3
- How to Get The Current Day in Google Analytics
- Is This the Most Important Civilizational Pattern?
- Consciousness is a Movie Screen Without an Audience, Theater, or Universe
- Your Value Comes From Your Output