Quantcast
Channel: Technological Musings
Browsing latest articles
Browse All 30 View Live

Programming Note

In 2012 I posted a little over a dozen entries to this blog. I like to think that each entry was well thought out and time well spent. But only a dozen? That's about one entry a month... I'd really...

View Article



Customer Dis-Service

In general, I'm a pretty loyal person. Especially when it comes to material things. I typically find a vendor I like and stick with them. Sure, if something new and flashy comes along, I'll take a...

View Article

Image may be NSFW.
Clik here to view.

Pebble Review

In April of 2012, a Kickstarter project was launched by a company aiming to create an electronic watch that served as a companion to your smartphone. A month later, the project exceeded it's funding...

View Article

BSides Delaware 2013

The annual BSides Delaware conference took place this past weekend, November 8th and 9th. BSides Delaware is a free community driven security event that takes place at the Wilmington University New...

View Article

SSL "Security"

SSL, a cryptographically secure protocol, was created by Netscape in the mid-1990's. Today, SSL, and it's replacement, TLS, are used by web browsers and other programs to create secure connections...

View Article


Becoming your own CA

SSL, as I mentioned in a previous blog entry, has some issues when it comes to trust. But regardless of the problems with SSL, it is a necessary part of the security toolchain. In certain situations,...

View Article

Keepin' TCP Alive

I was debugging an odd network issue lately that turned out to have a pretty simple explanation. A client on the network was intermittently experiencing significant delays in accessing the network....

View Article

Looking into the SociaVirtualistic Future

Let's get this out of the way. One of the primary reasons I'm writing this is in response to a request by John Carmack for coherent commentary about the recent acquisition of Oculus VR by Facebook. My...

View Article


Bleeding Heart Security

Unless you've been living under a rock the past few days, you've probably heard about the Heartbleed vulnerability in OpenSSL that was disclosed on Monday, April 7th. Systems and network administrators...

View Article


Will online retailers be the next major breach target?

In the past year we have seen several high-profile breaches of brick and mortar retailers. Estimates range in the tens of millions of credit cards stolen in each case. For the most part, these...

View Article

Image may be NSFW.
Clik here to view.

Boldly Gone

I have been and always shall be your friend.It's a sad day. We've lost a dear friend today, someone we grew up with, someone so iconic that he inspired generations. At the age of 83, Leonard Nimoy...

View Article

Suspended Visible Masses of Small Frozen Water Crystals

The Cloud, hailed as a panacea for all your IT related problems. Need storage? Put it in the Cloud. Email? Cloud. Voice? Wireless? Logging? Security? The Cloud is your answer. The Cloud can do it...

View Article

Network Enhanced Telepathy

I’ve recently been reading Wired for War by P.W. Singer and one of the concepts he mentions in the book is Network Enhanced Telepathy.  This struck me as not only something that sounds incredibly...

View Article


Hacker is not a dirty word

Have you ever had to fix a broken item and you didn’t have the right parts?  Instead of just giving up, you looked around and found something that would work for the time being.  Occasionally, you come...

View Article

Yes, your iToaster needs security

Let’s talk about your house for a moment.  For the sake of argument, we’ll assume that you live in a nice house with doors, windows, the works.  All of the various entries have the requisite locking...

View Article

Browsing latest articles
Browse All 30 View Live




Latest Images