Intro to Network Security, Week 2

Week 2 of this class, and it already feels like I’m on the right track.  Security issues are damn interesting, and after reading through this textbook, I was right to be so obsessive about reading security news and tutorials over the last year or so.  I know these definitions, I can think of examples, I’ve read some exploit code, I… Read more →

Scientific Chess Training?

I’ve been studying chess on and off for a couple years now, and it can seem like a huge undertaking.  Openings, end game, history, psychology, and everything else has been studied down to its core. This is an interesting paper that popped up on HackerNews today, titled “Training in chess: A scientific approach”.  Maybe it’ll give me some good ideas… Read more →

And so (spring) begins

Spring semester started yesterday, and even though I’m only taking two classes, Network Security and Cisco I.  It should be a fun ride now that I’m out of the woods of beginner crap I couldn’t get exempted from.  Updates might be more terse than before, but they’ll be regular as I work through these classes and dive into concepts I’ve… Read more →

9-9-2016_Today’s ACM TechNews newsletter!

This week’s Association for Computing Machinery TechNews newsletter had some good stuff in it, here are a couple of the highlights.   New ‘Gel’ May Be Step Toward Clothing That Computes I’ve experimented with hacking wearables for a couple years now, ever since I got an Arduino and then a Raspberry Pi.  Light up shoes, wireless speech readers, temperature sensors… Read more →

9-6-2016_which is best, python or C? (for embedded, that is)

This is an interesting article about an idea I’d never have thought would be possible (desirable?).  Running Python on embedded systems instead of a compiled language.  It would be pretty handy, beings I know Python better, but are there any advantages to using it versus C/C++? This quote in particular caught my eye: “The Barr Group study shows that over… Read more →

8-28-2016 Sunday Funday!

Why you should hire good, skilled cybersecurity professionals   What makes a “good” cybersecurity professional?  Is it all pentesting and code?  I’ve actually asked myself this quite often lately, with how deep I’ve been delving into the guts of operating systems and binaries.  Do I really need to do this?  Well, not really, but its kind of fun to see… Read more →