But the idea that we're in a simulated universe that can create simulated universes, suggests to me that we're an implementation of a Quicksort algorithm.
The next time anybody asks me about my religion, I think I’ll reply “Geek Orthodox”
"And the Geeks shall inherit the Earth."
In computer terminology, a honeypot is a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. This is similar to the police baiting a criminal and then conducting undercover surveillance.
Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.
Scamming the scammers 2 - The Honeypot
- Chess With Friends
Firmware Forensics: Diffs, Timelines, ELFs and Backdoors
This post covers some common techniques that I use to analyze and reverse firmware images. These techniques are particularly useful to disse
obscuresec: Command Injection to Code Execution with PowerShell
A common scenario that testers face involves leveraging command injection vulnerabilities into a full-blown shell. A lot of people view comm