Posts in Technology

Installing Suricata 4.* on Debian Stretch

// August 5th, 2019 // No Comments » // Hacking and Security

Kept getting version conflicts trying to install Suricata 4 IDS on Debian Stretch. Looks like Suricata expects to be installed on Buster which is sort of weird. Here’s how to get past the errors (e.g. libc6 requirement not met). For Ubuntu, the OISF maintains a PPA suricata-stable that always contains the latest stable release. sudo […]

Malicious sample JavaScript code – how to create an infinite loop in a modern-day browser window. Tip – don’t run on a mobile device!

// March 9th, 2019 // No Comments » // Hacking and Security

This is the code the 13-year-old Japanese girl was arrested for by Japanese police with no sense of humor. I’ve run it on a Windows box and yeah, you can get out of the loop. Works on Chrome and most mobile browsers.

Here are the Russians indicted by Mueller and the most intriguing crimes they perpetrated against the United States.

// March 7th, 2019 // No Comments » // Hacking and Security

The District of Columbia indicted 11 Russians for crimes against the United States. I reviewed the indictments and came up with the following items I found most interesting (or at least, thought provoking).

Here’s what a targeted Russian spear phishing attack looks like

// November 26th, 2017 // No Comments » // Hacking and Security

Russian hackers are basking in a lot of cred from their recent hacks against US government institutions.  In most cases, their most successful attempts where made via spear phishing attacks.  Here’s what a Russian targeted spear phishing email attack looks like.

List of programming steps to take when building .Net MVC application functionality

// May 11th, 2017 // No Comments » // Computers & Programming

Just in case you’re asked and want to sound like you know what you’re doing, here are the steps to take when building .Net application functionality.

Cell phone jammer circuit (GSM1900 network)

// March 20th, 2017 // No Comments » // Electronics

A mobile phone jammer circuit usable with GSM1900 and an effective frequency range of 1930 MHz through 1990 MHz. The GSM1900 network is used in Canada, South America, and the United States (T-Mobile and AT&T).

The big list of electronic component and integrated circuit (IC) package types

// March 14th, 2017 // No Comments » // Electronics

Integrated circuit packages, the form an IC is manufactured in, are as wide and varied as a Donald Trump “alternative truth”. Below is the big list of integrated circuit (IC) package types including the package name, package full (official) name, remarks and notes, and a picture of diagram of the electronic package.

Here are the recommended maximum data-length limits for common database and programming fields

// October 31st, 2016 // No Comments » // Technology

Although there are no definitive standards for common field length validations, we can come close using governmental standards, ISO recommendations, and database best practices based on maximum known values. Below are common database fields along with their maximum recommended allowable length and data type.

If you think driving from New York to LA in under 29 hours is no big deal – think again

// September 3rd, 2016 // No Comments » // Technology

They broke laws in 13 states and 93 counties, reaching speeds of 160 mph, on a 2,683-mile trip from New York to Los Angeles. The jaunt should realistically take over 41 hours – they did in under 29 driving an innocuous looking Mercedes that was decked out with more gear than a Oklahoma stormchaser’s rig.

Hands on with North Korea’s official Red Star 3.0 Server linux operating system

// January 12th, 2015 // No Comments » // Technology

Red Star OS, North Korea’s official Red Hat-based Linux distro, is very easy to install in a VM. Given recent revelations of its many security holes, it’s an excellent opportunity to install the operating system in a local VM and then pound it for vulnerability assessment. At the very least, this will let you derive […]

Oldest known photograph of a human being dates back to 1838

// November 9th, 2014 // No Comments » // Technology

The black and white photograph depicting an early 19th century scene was taken by Louis Daguerre in 1838 on the streets of Paris, France. With a seven minute exposure time, two stationary humans were captured on camera, making it the oldest known photograph containing actual images of people. Oddly, there were likely many other people […]

How to secure your Internet connection using a secure VPN through a secure VPN

// September 6th, 2014 // No Comments » // Technology

If you are suspicious of Tor, tired of the laggy connection, or simply want a more stable means to ensure your connection is encrypted and secure, you can easily create a VPN connection through a VPN connection which ensures anonymity and hard-core encryption of your network stream (with kill switches to protect your identity if […]

Visual history of Facebook- from its introduction in 2004 to its modern-day design

// February 6th, 2014 // No Comments » // Technology

2006 - Mark Zuckerberg's profile

“The Facebook” went live on February 4, 2004 from Mark Zuckerberg’s Harvard University dorm room. Ads began running shortly thereafter. In 2005, Facebook rolled out the News Feed and by 2007, Facebook simplified its design. By 2008, Facebook had 100 million users and launched Facebook Chat. In 2012, Facebook hit 1 billion members and in […]

The AVE Mizar – the historic “Flying Pinto” car that ended up killing its inventor

// May 30th, 2013 // No Comments » // Technology

Man’s’ preoccupation with the capability to escape his earthly domain and soar amongst the clouds has led to innumerable ingenious methods of getting aloft. Some methods have been practical – others not so much. Case in point – the AVE Mizar flying car, affectionately known as “The Flying Pinto”. Yes, “Pinto”, as in the “death […]

Differences in Chinese and Russian security philosophies and how the United States should counter

// April 15th, 2013 // No Comments » // Technology

I enjoy hacking. The intrigue, digging through arcane protocol specs in order to discover some new architectural design flaw or idiotic programmer bug, and the excitement surrounding a mysterious hidden world that few are capable of experiencing, in my mind is akin to losing yourself deep in a software coding problem. I consider myself a […]

Wily South Africans clean up scenic landscape with clumsy attempt to disguise cellphone towers as trees

// April 2nd, 2013 // No Comments » // Technology

South African photographer Dillon Marsh’s latest photographic series tipped us on to some hidden gems that we most likely would have never noticed – cellphone towers disguised as trees. The cellphone infrastructure often provides an incompatible fit with our typically scenic landscapes but those wily South Africans devised an interesting and to some, funny, solution […]