Hey vulnerability-researcher,
Here are some tips for documenting the reversing work you are doing.
` version 1 Jan 19, 2016.
version 2 Feb 23, 2016. `
#! /bin/bash | |
set -euo pipefail | |
# This script will remove automatic association for all networks not listed in the whitelist | |
# passed as the first argument. Passwords will NOT be removed from the Keychain. | |
# | |
# Alternatively, you can untick "Remember networks" in Network Preferences > Wi-Fi > Advanced, | |
# but then you won't be able to auto-join networks even temporarily, and you might already | |
# have a long list to go through. | |
# |
Hey vulnerability-researcher,
Here are some tips for documenting the reversing work you are doing.
` version 1 Jan 19, 2016.
version 2 Feb 23, 2016. `
Hello software developers,
Please check your code to ensure you're not making one of the following mistakes related to cryptography.
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<array> | |
<dict> | |
<key>shortcut</key> | |
<string>:smile:</string> | |
<key>phrase</key> | |
<string>😄</string> | |
</dict> |
As a good crypto nerd, I usually use an entirely encrypted linux FS: /
but also
/boot
using grub LUKS support. It's a good setup but it's not perfect, the BIOS and
the bootloader are not protected.
I recently got a USBArmory and I wanted to apply the same (or a better) setup.
I found some useful links but no clear howto. So this is my setup.
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.
This is a collection of snippets, not a comprehensive guide. I suggest you start with Operational PGP.
Here is an incomplete list of things that are different from other approaches:
{!-- The style guide is meant to be more than a reference for practical advice, stylistic rules, and examples of good practice. I am also trying to present an argument for the importance of digital scholarship in the form of apps, dissertations, webapps, and blogs. While aimed mostly at writing, I think it will eventually expand to include videos, audio, presentation slides, and such (oh my goodness, academics seriously need help with their slides).
The hard part is finding the right balance of argument and advice. It will presented as a website with its design/layout as an example template. It’s intended to be extremely opinionated, but modular, so others can pick pieces they wish to use as a foundation for their own style guides. (This is sort of a precursor to a modular pattern library for assembling style guides I’ve been wanting to build for content strategy work.)
I haven’t put in many of the citations and annotations, but they’re currently in {curly brackets}. --}
The essence of writing for digital
#Social Media Strategy
##About the Project
This was inspired by the Tiny Content Framework that focuses on “goals, messages, and branding.”
The Social Media Strategy collection is aimed at helping companies get started in planning their approach to social media. This is a bit of a template, and sprinkled with examples in each category. It should be a good starting point before a business dives head-first into whatever fancy social media outlet may be hot at the moment. (Tip: Find out what medium/outlet is best suited for your audiences before blindly signing up for accounts for whatever is the most popular at the moment. We used to think MySpace was going to rule the Earth for a while, until it faded into the background and gave way to Twitter, Facebook and the rest of the photo-sharing ones.)
##Contribute
require "rubygems" | |
require "twitter" | |
require "json" | |
# things you must configure | |
TWITTER_USER = "your_username" | |
MAX_AGE_IN_DAYS = 1 # anything older than this is deleted | |
# get these from dev.twitter.com | |
CONSUMER_KEY = "your_consumer_key" |