Disk usage with FlameGraph
Published:
Using FlameGraph for displaying disk usage.
Published:
Using FlameGraph for displaying disk usage.
Published:
I was looking for a LLMNR commandline lookup utility. Actually, dig
can do the job quite fine.
Published:
I thought I was understanding pretty well how bash argument processing and various expansions is supposed to behave. Apparently, there are still subtleties which tricks me, sometimes.
Published:
How I found remote code execution vulnerabilities via Cross Site Request Forgery (CSRF) on the administration interfaces of InternetCube applications and of the YunoHost administration interface which could have been used to execute arbitrary code as root. These vulnerabilities were fixed in YunoHost 3.3, OpenVPN Client app 1.3.0. and YunoHost 3.4.
Published:
Here is the workflow I am using to generate simple text documents (resume, cover letters, etc.) from Markdown, YAML and Jinja2 templates.
Published:
Trying to bring back some old IP spoofing Firefox extension for watching South Park episodes.
Published:
In the previous episode, I talked about some argument and shell command injections vulnerabilities through URIs passed to browsers. Here I am evaluating some other CVEs which were registered at the same time (not by me).
Published:
I found an argument injection vulnerability related to the handling of the BROWSER
environment variable in sensible-browser
. This lead me (and others) to a few other arguments and shell command injection vulnerabilities in BROWSER
processing and browser invocation in general.
Published:
In Tail Recursion In Python, Chris Penner implements (self) tail-call optimization (TCO) in Python using a function decorator. Here I am extending the approach for sibling calls.
Using SSH as a transport for your protocol
Published:
A comparison of the different solutions for using SSH2 as a secured transport for protocols/services/applications.
Page 7 of 12 | Previous page | Next page | JSON Feed | Atom Feed