2012-09-01T00:01:34+00:00 To: Public
it's really hard to rage-quit a high-latency network2012-04-12T15:17:45+00:00 To: Public
I don't understand why Fedora is reinventing the wheel: http://ur1.ca/8zn892011-12-10T00:24:54+00:00 To: Space Hobo, Public
@spacehobo now I'll need to find a computer-controlled lathe to make that happen. :)2011-09-12T18:07:07+00:00 To: Public
sad: last week with Canonical. excited: next week, Google. http://www.outflux.net/blog/archives/2011/09/12/5-years-with-canonical/@kees good luck with your new job!2011-09-11T19:02:26+00:00 To: Public
when using /proc/sys/kernel/modules_disabled it's a good idea to load hid and usbhid ahead of time2011-09-10T03:07:09+00:00 To: Public
crushing airport wifi with an ISO download2011-08-06T11:33:06+00:00 To: Public
DJing lesson from mauvehed ftw #defcon2011-08-06T22:10:24+00:00 To: Public
key impressioning: an entire lock-sport genre I had no idea existed. jaw-droppingly awesome. #defcon2011-08-06T22:08:16+00:00 To: Public
runtime process insemination: also clean and hard to notice. ubuntu still blocks it. #defcon2011-08-06T22:07:19+00:00 To: Public
linux thread injection: clean and hard to notice. ubuntu blocks it. #defcon2011-08-05T22:17:32+00:00 To: Public
I think I just gave myself a paper^Wtitanium cut #defcon2011-08-05T21:36:33+00:00 To: Public
the Rio's retail cash register network just went down... #defcon2011-08-05T19:35:01+00:00 To: Public
pdf obfuscation: many ways to confuse parsers via filters, loops, options, incomplete syntax. #defcon2011-08-05T06:50:25+00:00 To: Public
for added dramatic effect, I have now added the --hollywood mode to my exploit demo #defcon2011-08-05T18:39:26+00:00 To: Public
art & science of security research: find intersecting topics you have passion about, don't self-censor #defcon2011-08-05T04:50:35+00:00 To: Public
d'oh, inhuman badge line closed early. now I have get up at the inhuman time of 8am to get my badge! #defcon2011-08-05T16:47:28+00:00 To: Public
let the waiting in lines begin! #defcon2011-08-04T23:05:11+00:00 To: Public
#blackhat vulnerability extrapolation: find common API patterns, look for bugs "near" known vulns. worked for pwning ffmpeg.2011-08-04T21:45:25+00:00 To: Public
#blackhat crypto for pentesters: easy to break common misuses of hashes, encryption, etc. "hollywood decryption"2011-08-04T19:10:27+00:00 To: Public
#blackhat sophos antivirus: XOR for encryption, "malware is a post-compromise concept", needs a lot of improvement