We continue the series of unboxings leading up to the final box made possible by my my recent eBay purchases!
I recently made a series of purchases on eBay and the contents of each box is known only to me. See if you can guess what I will eventually end up with and why.
Are hackers watching you as you sleep? I think it’s a crazy world of hype and here’s why.
If you offer file downloads from your site or if you have various features that users can interact with, it might be helpful to capture usage data.
Fun project today, I had to substitute each & with its HTML equivalent (&) but not any ampersands where the substitution had already taken place.
Anyone can follow a list of procedures, when do I get to make a difference? Can’t I just spend my time automating this?
In 2011, as a grad student, I forensically examined a TrueCrypt container to see if I could tell if it contained anything useful for an investigation. In doing so I learned a lot about implementing strong encryption.
What happens when computer scammers call me? I give them “on the phone training in patience.”