A while ago I wrote a post on HTTP Security Headers and part of that invloved setting up a content security policy (CSP) and in that I say
I've done a SHA-256 hash of the script
and I just left it at that, simple right? Only now a it's little …
A while ago I wrote a post on HTTP Security Headers and part of that invloved setting up a content security policy (CSP) and in that I say
I've done a SHA-256 hash of the script
and I just left it at that, simple right? Only now a it's little …
I mentioned Occam's razor in a previous post and it's a philosophy I'm a huge fan of. Especially in information secuirty.
Often it's summed up as
"the simplest explanation is usually the correct one"
I think it's easy to get carried away with theories that could be posible rather than …
About a week ago we had an issue with a HP X1600 G2 Network Storage System Server. After rebooting we got an error message in the event log roughly ever minute with Event ID 7031
The HP Automated Storage Manager Server service terminated unexpectedly. It has done this 1 time …
There is a story that's been doing the rounds lately about malware that took control of microphones and uploaded over 600 GB of audio to its command and control. As others in the security industry have pointed out this is a great example of where we can make fairly confident …
This is a little off my usual topic of IT Security but it's something I've been thinking about a bit lately. I recently came across the "One hundred prisoners and a light bulb" riddle. It was posed as:
A group of 100 prisoners, all together in the prison dining area …
Content on this site is licensed under a Creative Commons Attribution 4.0 International License.
Built using Pelican.
Based on a theme by Giulio Fidente on github.