Pages:
- About
- About the Advertisements
- Activity
- Blog
- Books
- Bucketlist
- Colophon
- Cybersecurity
- Explore
- Explore (Legacy)
- Food
- Happiness
- Home
- Honeytrap
- Humor
- Information Security
- Inputs
- Inspiration
- IP
- Jokes
- Lifestyle
- Login
- Media Inquiries
- Members
- Most Popular
- Movies
- Music
- Payment Confirmation
- Privacy
- Projects
- An Atheist Debate Reference
- An Information Security Glossary of Terms
- Book Summaries
- Book Summary: Fall
- Summary : Waking Up
- Summary: Algorithms to Live By
- Summary: Amusing Ourselves to Death
- Summary: Atlas Shrugged
- Summary: Atomic Habits
- Summary: Blue Team Field Manual
- Summary: Capital and Ideology
- Summary: Capital in the Twenty-First Century
- Summary: Coming Apart
- Summary: Enlightenment Now
- Summary: Fire and Fury
- Summary: Flowers for Algernon
- Summary: Homo Deus
- Summary: Human Hacking
- Summary: Influence — The Psychology of Persuasion
- Summary: Left of Bang
- Summary: Lord of the Flies
- Summary: Metamorphosis of Prime Intellect
- Summary: Naked Economics
- Summary: Naked Statistics
- Summary: Never Split the Difference
- Summary: Rework
- Summary: Sapiens
- Summary: Sleeping Giant
- Summary: Spent
- Summary: Style: Lessons in Clarity and Grace
- Summary: The 21 Immutable Laws of Marketing
- Summary: The Age of Surveillance Capitalism
- Summary: The Dichotomy of Leadership
- Summary: The Graveyard Book
- Summary: The Inevitable — Understanding the 12 Technological Forces That Will Shape Our Future
- Summary: The Infinite Game
- Summary: The Pentester’s BluePrint
- Summary: The Power of Less
- Summary: The Stranger
- Summary: The Subtle Art of Not Giving a F**k
- Summary: The Tyranny of Metrics
- Summary: The War on Normal People
- Summary: The Wisdom of Psychopaths
- Summary: Uncertainty
- Summary: Willpower
- Summary: Zealot
- Concepts
- CTF Solution Reference
- Grammar
- Ideas
- The GT Rating System
- Web Application Security Testing Resources
- Quotes
- Recommended
- Restaurants
- Site Archives
- Sitemap
- Subscribe
- Subscribe Complete
- Technology
- Thank You For Your Support
- The Unsupervised Learning Newsletter
- The Unsupervised Learning Podcast
- This is a secret directory…
- Tutorials
- 60 Cybersecurity Interview Questions [2019 Update]
- A
ffuf
Primer - A Beer Primer
- A Bettercap Tutorial — From Installation to Mischief
- A Blockchain Primer
- A Business Writing Primer
- A Class Primer
- A Coffee Primer
- A CrowdSec Primer: A Modern Replacement for Fail2Ban
- A DNS Primer
- A find Tutorial and Primer
- A git Primer
- A grep Tutorial and Primer
- A Hiring Primer
- A Leadership Primer
- A Null Pointer Dereference Primer
- A Relativity Primer
- A Security-focused HTTP Primer
- A Shodan Tutorial and Primer
- A Siri Primer and Reference
- A Steak Primer
- A Subnetting Primer
- A tar Primer
- A tcpdump Tutorial with Examples — 50 Ways to Isolate Traffic
- A Tea Primer
- A tr Primer
- A Typography Primer
- A Unix and Linux Permissions Primer
- A USB-C Primer
- A Varnish Primer
- A Web Performance Primer
- A Wine Primer
- Alfred
- amass — Automated Attack Surface Mapping
- An Agile Primer
- An Artificial Intelligence Primer
- An Audio Quality Primer
- An Encoding Primer
- An ICMP Reference
- An ICS/SCADA Primer
- An Information Security Metrics Primer
- An IPTABLES Primer
- An lsof Primer
- An MVC Primer
- An Ngrok Tutorial and Primer
- An NMAP Primer
- An SEO Primer
- Big-O Notation Explained
- Building Yourself a DMZ
- Correlation vs. Causation
- Diffie-Hellman
- Dining
- Drinking
- EDM Types
- Encoding vs. Encryption
- Ettercap
- Firewalls
- Generating Power in Your Loops
- Glossary
- Hashing vs. Encryption vs. Encoding vs. Obfuscation
- Hexedit
- Hiding Your IP
- How to Build Spoiler Protection in your HTML
- How to Manually Set Your IP in Linux (including ip/netplan)
- How to Remember Your TCP Flags
- How to Set Your IP in Linux
- Information Security Assessment Types
- Information Security Concepts
- Information Security Definitions
- Learn Vim For the Last Time: A Tutorial and Primer
- Masscan Examples: From Installation to Everyday Use
- Mobile (Cellular) Technologies Explained
- Multi-dimensional Vulnerability Hierarchies
- My Ümlaut Page
- Network Ports
- Not All SYNs Are Created Equal
- P vs. NP Explained
- Philosophy
- Photography
- Politics
- Positional Number Systems
- Postfix
- Practical Security Principles
- Programming
- Public Vulnerability Database Resources
- Same Origin Policy
- Secrecy (Obscurity) is a Valid Security Layer
- Serialization Security Bugs Explained
- Tactical
tmux
: The 10 Most Important Commands - The Birthday Attack
- The Carriage Return and Line Feed Characters
- The Definition of a Purple Team
- The Difference Between a Programmer, Developer, and a Hacker
- The Difference Between a Vulnerability Assessment and a Penetration Test
- The Difference Between Events, Alerts, and Incidents
- The Difference Between Fedora, Redhat, and CentOS
- The Difference Between Red, Blue, and Purple Teams
- The Difference Between Stack and Heap Based Memory
- The Difference Between System V and SystemD
- The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
- The Hyperlink Trailing Slash
- The IMAP IDLE Command
- The Internet, the Deep Web, and the Dark Web
- Wardrobe
- What Matters More for Acceleration: Horsepower or Torque?
- What’s the Difference Between a URI and a URL?
- Whiskey
- Zone Transfer Primer
- Videos
- Adaptive Testing Methodology [ATM]
Categories:
- Business
- Creativity
- Culture
- Happiness
- Information Security
- Lifestyle
- Miscellaneous
- Personal
- Philosophy
- Politics
- Science
- Technology
Monthly:
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- November 2004
- October 2004
- September 2004
- August 2004
- June 2004
- May 2002
- November 1999
- September 1997
- July 1997
- June 1997
- April 1997
- February 1997
- January 1997
- December 1996
- November 1996
- October 1996
Recent Posts:
- We Were Very Wrong About Testosterone
- Digitally Imported High Quality Station URLs
- The Ways We Deceive Ourselves
- Levels of Joy (Fulfillment)
- My Journey to Beginner Audiophile
- 30 Books That I Will Re-Read For The Rest of My Life
- A More Positive Take on America’s Potential Fall
- Brag About Your Content, Not Your Tools
- A @TomNomNom Recon Tools Primer
- Orwell Reviews Mein Kampf and Perfectly Captures Trumpism
- Beliefs Have Consequences
- Enthusiasm is Life
- Banning Parler Was Like Banning Hate Speech or Pornography (See Common)
- Being an Avid Reader is Like Machine Learning
- The Line Between Choosing Your Own Customers and Censorship
- On Unionizing Against Tech Companies
- Nostalgia is a Type of Surrender
- Maximizing Appreciation of Life
- Some Thoughts Going Into 2021
- 3 Metrics That Will Indicate We’re Taking Security Seriously
- Whose Life Are You Living?
- It’s Becoming Easier to Fail and Succeed
- Google is Getting Left Behind Due to Horrible UI/UX
- Amazon Will Dominate Through 10,000 Small Bets
- The Rise of Home Theater
- Some Free-form Thoughts on Ayn Rand, Objectivism, and Other Big Ideas
- Analysis of the RECON/Attack Surface Management Space
- The Key to Trump’s Effectiveness is Believing His Own Lies
- The New Reality of State-sponsored Attacks on US Businesses
- Reddit RSS Functionality Explained
- Introducing Amazon Curate (I Wish)
- How Reading and Meditation Extend Life
- Social Media and AI Are Mirrors That Reveal Our Ugliness
- Trump Would Be a Horrible White Supremacist
- Why Robinhood is Dangerous for New Investors
- Organizing Feedly by Tags
- My View on Abortion
- Joe Rogan vs. Alex Jones
- Demand, CyberInsurance, and Automation/AI Are the Future of InfoSec
- The Simple Reason Polls Failed So Hard in 2020
- The East, West, Individualism, Collectivism, and COVID
- Two Statistics That Make Me Think Trump Will Win Again
- The Future of Sensors, Algorithms, and Recommendations
- I Actually Like Remote and Pre-recorded Presentations
- How to Write Well
- Substack is Great For Newsletters, But Not For New Creators
- You Should Be Running Your Own VPN Server
- Trump is the Worm, Not the Unpatched Network
- Retroactive Mindfulness
- The Content Value Hierarchy (CVH)
- The Relationship Between Hardship, Struggle, and Meaning
- Civil War Would Look Different This Time
- Ransomware Groups Add a Third Threat Vector: DDoS
- Operation Fortify: A US Ransomware Plan
- Cyber Pearl Harbor Is Happening Right Now — It’s Ransomware
- You Can Subscribe to Newsletters in Feedly
- Everyday Threat Modeling
- Why I Like TikTok So Much
- No, Moving Your SSH Port Isn’t Security by Obscurity
- I’ve Been Too Sloppy in the Past
- Worst Damage Theory
- Our Problem is Gullibility, Not Disinformation
- Primary Concern Theory
- The Original Meaning of ‘Begging the Question’
- Is Anxiety Freedom Without Direction?
- Zuboff vs. Doctorow vs. Miessler: What’s the Greatest Threat to Human Privacy?
- Why Creators Should Move to Direct Support Monetization
- Algorithmic vs. Faith-based Learning
- Google is Encouraging Bad Behavior By Not Listing Updated Content Dates
- Mechanizing The Methodology
- How to Initiate Contact With a Mentor
- What They Don’t Tell You About Being a Bounty Hunter or Content Creator
- Another Way to Think About Consciousness and the Lack of Self
- Positive Nationalism
- Why I’m Staying in the Stock Market
- Blueprint + Blueprint = Behave
- The Left Can Lose This Election by Becoming as Unlikeable as Clinton
- Reverse Threat Modeling for Pursuing Attribution
- A Historical Cycle That Limits Progress
- I Want to Make Art
- The Human Obsession With Rarity
- Strange SSH Denial of Service on AWS
- Our Lighted Path to Totalitarianism
- Bad Governments on the Left and Right Meet in the Middle
- The American Right’s Creeping Definition of Fascism
- Why I Believe Trump is Compromised by Russia
- Searching for the Ultimate Obstacle to Creativity
- America is Falling Because You Can’t Maintain a Democratic Republic With a Stupid Population
- Chasing the Perfect Podcast Microphone Sound
- The Difference Between Both-Sidesing, All Lives Matter, and Acknowledging Complexity
- An Appeal to Those on The Center Right Regarding the Protests and Unrest
- Why Central Park Karen Deserves What She Got
- Why I Believe Trump Will Win in 2020
- Is China Making a Major Strategy Mistake?
- Frame: Defining My Life Theme
- Analysis of the 2020 Verizon Data Breach Report
- A Massive Collection of Zoom (Virtual Meeting) Backgrounds
- Are There Such Things as Anti-Fragile Stocks?
- Responding to Questions About Hard Determinism
- It’s Time to Get Back Into RSS