A 10,000ft answer to: "How did they steal _______ from my laptop?"
Walking down the invisible roads around us with pigs and barns.
Cost-effective design for highly available and fault tolerant systems using ELB and Auto Scale.
Fears of every database and search field associated with a web application.
Hacking, Metasploit, and a real example of 'hacking' a machine.
Want to keep your search history to yourself? Learn how to make your own little anonymizing proxy!
What is the "dark web"? What is Tor? How does it work? This posts takes a look under the hood of how this anonymizing service works.
My first blog post