Newest Stories by henkjan
Home
Recent
Comments
Search
Login
10
Backdoor in a Public RSA Key
security
kukuruku.co
via
henkjan
3 years ago
|
cached
|
1 comment
1
19
The history of grep, the 40 years old Unix command
unix
medium.com
via
henkjan
3 years ago
|
cached
|
1 comment
1
11
Nerdy trivia about Unix time_t
unix
fanf.livejournal.com
via
henkjan
3 years ago
|
cached
|
no comments
0
8
Why curl defaults to stdout
unix
daniel.haxx.se
via
henkjan
3 years ago
|
cached
|
5 comments
5
5
CVE-2014-6332: it’s raining shells
security
forsec.nl
via
henkjan
3 years ago
|
cached
|
3 comments
3
10
CREAM: the scary SSL attack you’ve probably never heard of
security
tonyarcieri.com
via
henkjan
3 years ago
|
cached
|
no comments
0
3
Optimizing Your psql
databases
unix
periscope.io
via
henkjan
3 years ago
|
cached
|
3 comments
3
19
What does the slash in crontab(5) actually do?
unix
binblog.info
via
henkjan
3 years ago
|
cached
|
3 comments
3
5
iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign
security
windows
isightpartners.com
via
henkjan
3 years ago
|
cached
|
1 comment
1
15
Vim blowfish encryption... or why you shouldn't roll your own crypto
security
vim
dgl.cx
via
henkjan
3 years ago
|
cached
|
1 comment
1
9
The Horror of a 'Secure Golden Key'
privacy
security
keybase.io
via
henkjan
3 years ago
|
cached
|
1 comment
1
16
Libressl's prng is unsafe on linux
linux
security
agwa.name
via
henkjan
4 years ago
|
cached
|
1 comment
1
8
Hack your OS X desktop environment
☶
mac
release
github.com
via
henkjan
4 years ago
|
cached
|
2 comments
2
9
How did vi come about - Interview with Bill Joy (1984)
vim
web.cecs.pdx.edu
via
henkjan
4 years ago
|
cached
|
no comments
0
1
Did Twitter silently remove login verification using their Twitter app?
security
securitynirvana.blogspot.no
via
henkjan
4 years ago
|
cached
|
no comments
0
7
ISC Concludes BIND 10 Development With Release 1.2
release
marketwired.com
via
henkjan
4 years ago
|
cached
|
no comments
0
1
A small demo scene production, running in the JavaScript console
javascript
sandbox.photonstorm.com
via
henkjan
4 years ago
|
cached
|
no comments
0
4
Flickr from SQL Injection to RCE
security
pwnrules.com
via
henkjan
4 years ago
|
cached
|
no comments
0
6
Keybase.io vulnerability
security
ejj.io
via
henkjan
4 years ago
|
cached
|
3 comments
3
10
AWS urges developers to scrub GitHub of secret keys
security
mobile.itnews.com.au
via
henkjan
4 years ago
|
cached
|
2 comments
2
12
Coping with the TCP TIME-WAIT state on busy Linux servers
linux
networking
vincent.bernat.im
via
henkjan
4 years ago
|
cached
|
2 comments
2
2
Silk Road 2 Hacked, All Bitcoins Stolen – $2.7 Miliion
cryptocurrencies
deepdotweb.com
via
henkjan
4 years ago
|
cached
|
13 comments
13
2
Secure your rsync shares, please.
privacy
security
blog.steve.org.uk
via
henkjan
4 years ago
|
cached
|
no comments
0
4
So my Asus router was vulnerable and I blogged about my response
security
blogs.law.harvard.edu
via
henkjan
4 years ago
|
cached
|
4 comments
4
11
Why your certificate authority rarely matters, and expensive certificates are not safer
security
erik.io
via
henkjan
4 years ago
|
cached
|
4 comments
4
<< Page 1
|
Page 3 >>