top of page
“In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms."
Search


Sound and Fury!
The phrase “full of sound sound and fury, signifying nothing” is part of one of the most famous soliloquies in the English language. It...
Sep 26, 20215 min read


Risk!
Risk ( https://en.wikipedia.org/wiki/Risk_%28game%29 ) is one of those games that seems to endure. It’s a simple game, which is probably...
Sep 19, 20216 min read


Direct Objects!
I have been spending most of my (relatively) free time working on PHP ( https://www.til-technology.com/post/it-s-been-a-long-time ), and...
May 30, 20213 min read


InfoSec Basics - Pen Test!
Pen test? That’s when you try to identify who’s who in this photo of the famous magicians Penn & Teller ( https://en.wikipedia.org/wiki/...
May 2, 20215 min read


Not a Hacker!
#TIL that Kali Linux ( https://en.wikipedia.org/wiki/Kali_Linux ) was not named after the Hindu goddess Kali. This was actually a great...
Apr 18, 20215 min read


Kanban POC
It’s nice to look back and be satisfied with a decision you made. Decision-making is part of our lives, from literal life-and-death...
Jan 31, 20215 min read


This pi tastes funny!
Most “technology people”, whatever they do, seem to be the de facto technology support for everyone they know. In my own case, back in...
Dec 27, 20204 min read


InfoSec as a Martial Art
In his classic series, Martial Arts and Ways of Japan (Weatherhill, 3 volumes, 1973–1974), Donn Draeger ( https://en.wikipedia.org/wiki/...
Dec 21, 20207 min read


Data is radioactive
Data is, like, literally radioactive. I was going to comment on the distortion and misuse of the word “literally” and comment that its...
Nov 29, 20206 min read


InfoSec Basics - Multi-factor Authentication
Multi-factor Authentication, or “MFA”, ( https://en.wikipedia.org/wiki/Multi-factor_authentication ) can be quite confusing, but I think...
Nov 8, 20206 min read


InfoSec Basics - What is Cryptography?
Cryptography makes the world go ‘round. With apologies to Broadway ( https://en.wikipedia.org/wiki/Love_Makes_the_World_Go_%27Round_%28...
Oct 25, 20205 min read


InfoSec Bullshido – Zero-day
“Zero-day” ( https://en.wikipedia.org/wiki/Zero-day_%28computing%29 ) or “0-day” (also pronounced “oh-day”), is another term that we hear...
Oct 18, 20206 min read


InfoSec Bullshido – Dark Web
When considering the term “dark web”, I had trouble deciding whether to post under InfoSec Basics or InfoSec Bullshido. On the one hand,...
Oct 11, 20207 min read


InfoSec Basics – Credential Stuffing
Now that we know a bit about hashing ( https://www.til-technology.com/post/infosec-basics-hashing ) and passwords (...
Sep 27, 20208 min read


InfoSec Basics – Passwords are easy, right?
Everyone knows what passwords are, and how they work. Right? The basic concept is simple enough, and has been around for quite a long...
Sep 7, 20206 min read


InfoSec Bullshido – Password Complexity Rules
Bullshido ( https://en.wiktionary.org/wiki/bullshido ) is a term referring to exaggerated or fraudulent claims around martial arts. The...
Aug 30, 20205 min read


InfoSec Basics - Hashing
Every field has basic concepts that are essential to real understanding of the field. In the context of Information Security, “hashing”...
Aug 23, 20205 min read
bottom of page