Home » Archive


Written By: Tom on September 10, 2013 84 Comments
DEFCON 21 – Network Forensics Puzzle Contest

This year at DEFCON 21, I had the opportunity to play in the network forensics puzzle contest. This was my second year playing. Last year, I placed 4th out of about 250 teams, so I felt the need to go back and do better this year! Right at 5 hours, I completed all 8 levels [...]

Written By: Tom on May 16, 2012 28 Comments

My presentation from the May 16, 2012 CIALUG meeting. Click to view.

Written By: Tom on November 26, 2010 9 Comments

A several weeks ago, Peter from Lutheran Church of Hope emailed me a picture of their brand new Dell md3000i iSCSI array with its angry light on. For those of you who don’t know, an md3000i is a fancy box with a bunch of hard drives in it and has redundant everything. This thing is [...]

Written By: Tom on January 23, 2010 50 Comments

A couple years ago, after I purchased a mac laptop with a built-in camera, I set it up to take a picture every time it booted/woke up and upload it to one of my web servers if internet access was available. I called it my poor man’s laptop lojack.[...]

Written By: Tom on April 26, 2009 3 Comments

It’s an old joke, but funny if you’re a dork like me: There are 10 types of people in this world.  Those who understand binary and those who don’t. Let’s talk about numbering systems.  Specifically Decimal (base10), Hexadecimal (base16) and Binary (base2). First off, what is this base stuff that you’re talking about.  The base number in [...]

Written By: Tom on April 22, 2009 3 Comments

Greetings!  It’s been about a year since my last blog post so it is time for my obligatory annual entry. Actually, a couple people have asked me to write up some instructions on getting remote access to a home / office network so they can use remote resources like Apple’s Time Capsule or iTunes music [...]

Copyright © 2011 Tom Pohl, All rights reserved.