Finding Your Inner Evildoer: Part 1
As a Security Tester, or hacker, I have one of the most exciting and creative jobs in the industry. We are asked to find as many critical security vulnerabilities in complex sof...
CISCO Password Revealer
I haven’t had much luck with any CISCO clients on the mac. Inevitably clients will send me a CISCO profile configurations that I can’t easily use on my mac. I went searching for...
The High Cost of an Application Security Data Breach
In the wake of the Sony Security Breaches (breaches, you say? As in plural? Yes, read on for more information) I decided to update some of our instructor led training slide deck...
When is it OK to Build up Technical Debt
As I previously mentioned I’ve been writing a bit of Ruby on Rails. I’m surprised at how quickly I can slap something together and get results, especially prototypes, up and run...
Time Management with the Pomodoro Technique
About 6 months ago it seemed like the internet was infatuated with a new time management technique called “Pomodoro.” Developed by Francesco Cirillo, The Pomodoro Technique is a...
Manage Energy Not Time
Recently I was forced to work only 6 hours per day. On the surface this seems great, I immediately started filling my time with other things that I’ve wanted to get around to, b...
Goals, Results and Activities - defining your productivity
I think that it is important to properly define the terms that we use when talking about productivity. Since these words are somewhat subjective it matters more that you have a ...