This year at DEFCON 21, I had the opportunity to play in the network forensics puzzle contest. This was my second year playing. Last year, I placed 4th out of about 250 teams, so I felt the need to go back and do better this year! Right at 5 hours, I completed all 8 levels [...]
My presentation from the May 16, 2012 CIALUG meeting. Click to view.
A several weeks ago, Peter from Lutheran Church of Hope emailed me a picture of their brand new Dell md3000i iSCSI array with its angry light on. For those of you who don’t know, an md3000i is a fancy box with a bunch of hard drives in it and has redundant everything. This thing is [...]
A couple years ago, after I purchased a mac laptop with a built-in camera, I set it up to take a picture every time it booted/woke up and upload it to one of my web servers if internet access was available. I called it my poor man’s laptop lojack.[...]
It’s an old joke, but funny if you’re a dork like me: There are 10 types of people in this world. Those who understand binary and those who don’t. Let’s talk about numbering systems. Specifically Decimal (base10), Hexadecimal (base16) and Binary (base2). First off, what is this base stuff that you’re talking about. The base number in [...]
Greetings! It’s been about a year since my last blog post so it is time for my obligatory annual entry. Actually, a couple people have asked me to write up some instructions on getting remote access to a home / office network so they can use remote resources like Apple’s Time Capsule or iTunes music [...]