Modern digital currency mostly seem to revolve around a construct called a blockchain, which – by design – is a (mostly![1]) append-only distributed database that is intended to keeps all the transactions for all time. Blockchains use strong cryptographic methods to ensure its integrity and fidelity, and is typically decentralized, meaning that the entire chain is distributed in close-to-real-time fashion over the Internet to all computers that are using […]
art
It was a good night! In order: Marc Hebrart Brut Rosé NV Dom Ruinart Brut, 2002 Dom Perignon, 2004 Illuminated Magnum Roederer Cristal 2006 Dom Perignon, 2002 Rosé All were nigh breathtaking, and to have them all together was a special occasion indeed. Actually there was 2x all the above (except the magnum), plus various bottles of Veuve Clicquot to cleanse the palate and drink before/after, along with caviar, tarts, oysters, […]
Security Policies Let us praise, slay, and bury security policies together. A security policy is perhaps the best way to deal with the security monster. It concerns itself with business and organizational issues, and is designed to assist the organization succeed in spite of human nature. I sometimes not-so-glibly say that a security policy is simply an expression of your desire. What do you want to see within your organization […]
shotgun scanning
UDP scanning has always been slow. Slower than slow, slower than molasses, really fucking slow. So when I started being interested in scanning for IPMI out in the wild, which runs on UDP 623, I first fired up trusty ol’ nmap… but bless it’s heart, it’s a cautious, robust scanner that is outrun by crippled snails on UDP scanning. So I thought… well, most scans don’t really need a request-response-follow-up… […]