Luke Sheppard's blog about information security, web development, and hacking 

GCIH Exam Certification Objectives

  Above is a five minute, thirty second audio file reading the GCIH Exam Certification Objectives as published at the giac.org page for GCIH. GCIH Exam Certification Objectives Backdoors &

Read More…

 

Protected: Casing the joint

There is no excerpt because this is a protected post.

 

Reading about C pointers and such

Pointers in the C language have tortured a few generations of programmers by now. But they are also one of the most useful, powerful, and important parts of the language.

Read More…

 

SHA1 Hashes of Very Large Files

SHA-1 has been widely disparaged for security reasons, but it is just fine for checking file integrity. But like all things in computer science, when the files get really large

Read More…