Just Another Security Blog
Friday, December 29, 2023
Monitoring Certificate Transparency Logs
›
What is Certificate Transparency? Wikipedia defines it as: Certificate Transparency (CT) is an Internet security standard and open source ...
The Resurrection
›
Blogs have always been a vibrant space for individuals to express their thoughts, share experiences, and build communities. However, somet...
Wednesday, October 10, 2012
HITB Malaysia - Day 1
›
I am currently attending Hack In The Box (HITB) , a major security conference in Kuala Lumpur, Malaysia. This is the first security co...
Wednesday, September 26, 2012
WiFi Scanner in OSX Mountain Lion
›
Its a little known fact that OSX Mountain Lion comes with a Builtin wireless scanner. This scanner comes in quite handy when surveying ava...
Friday, July 23, 2010
CentOS 5.5 Upgrade Bug
›
After upgrading a few production servers from CentOS 5.4 to CentOS 5.5, I have identified a potential bug in the upgrade. For some reason t...
Friday, August 07, 2009
Google-Hacking Google's Safe Browsing List
›
I discovered a kind of cool trick the other day with the Google safe browsing service. When doing a client vulnerability assessment or pen-...
Tuesday, July 28, 2009
Scam Protection - Open Letter to the bar owners of Thailand
›
Here in Chiang Mai, as well as various other parts of Thailand, one seemingly popular scam, is collection of music royalties and levying of ...
3 comments:
›
Home
View web version