whoisjoe.com

Security, people, process, and resilient software.

83 published stories
Hero

Finding Your Inner Evildoer: Part 1

As a Security Tester, or hacker, I have one of the most exciting and creative jobs in the industry. We are asked to find as many critical security vulnerabilities in complex sof...

Hero

CISCO Password Revealer

I haven’t had much luck with any CISCO clients on the mac. Inevitably clients will send me a CISCO profile configurations that I can’t easily use on my mac. I went searching for...

Hero

The High Cost of an Application Security Data Breach

In the wake of the Sony Security Breaches (breaches, you say? As in plural? Yes, read on for more information) I decided to update some of our instructor led training slide deck...

Hero

New WikiRater Features

I’ve been working to add a few more features for WikiRater that I think are really cool. The one that I’ve had the most fun with so far is the “Trending Article” page. This page...

Hero

When is it OK to Build up Technical Debt

As I previously mentioned I’ve been writing a bit of Ruby on Rails. I’m surprised at how quickly I can slap something together and get results, especially prototypes, up and run...

Hero

Time Management with the Pomodoro Technique

About 6 months ago it seemed like the internet was infatuated with a new time management technique called “Pomodoro.” Developed by Francesco Cirillo, The Pomodoro Technique is a...

Hero

Manage Energy Not Time

Recently I was forced to work only 6 hours per day. On the surface this seems great, I immediately started filling my time with other things that I’ve wanted to get around to, b...

Hero

Goals, Results and Activities - defining your productivity

I think that it is important to properly define the terms that we use when talking about productivity. Since these words are somewhat subjective it matters more that you have a ...