XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.
Backyard Chickens – Clean the Coop Again
Generally you need to do a full cleaning of your backyard coop/ run/ etc. around once every 3 months. By this, I mean the area around the chickens. The nesting boxes you have to keep much cleaner. Those I try and do about once a month. This is where you chicken is going to lay Read More …
Peter Thiel’s move to the right
Peter Thiel and his potential desire to collapse all things America have been in the US news quite a bit lately. This isn’t the first time I was aware of this overly private person, and I do mean before Hulkamania. I’m not entirely sure when Peter Thiel and his Yarvin-acolytes began to join this movement Read More …
Do you really need to do that Human?
On a warm spring morning, the sun rose over the Johnson family’s backyard, revealing a perfectly manicured lawn, vibrant flowerbeds, and a gleaming new vegetable patch. The yard was the pride of the family, especially Mrs. Johnson, who had spent months cultivating it. But lurking in the coop by the fence was a group of Read More …
clean up /boot (for Ubuntu at least)
Here is a quick set of commands to clean up the /boot partition on an Ubuntu linux system. First check what your kernel version is so you won’t delete the running kernel image: uname -r Now run this for a list of installed kernels: dpkg –list ‘linux-image*’ | grep ^ii delete the kernels you don’t Read More …
What are the advantages of FASP
The speed increases are achieved by sending larger packets than TCP, not waiting for confirmation that a packet has been received before sending the next one, and only re-sending packets that are confirmed as having been dropped. FASP (Fast and Secure Protocol), used in IBM Aspera, offers significant advantages for cloud data transfer, enabling faster, Read More …
Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion
Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …
Wild Auto Insurance claims in Arizona
https://azcapitoltimes.com/news/2025/03/09/to-lower-costs-for-families-and-businesses-we-must-end-lawsuit-abuse/ How does this affect auto insurance? Author never says. They just make the wild accusation, follow it up with a fact, and then double down on their wild accusation. No evidence as to why they are related. https://www.insurancebusinessmag.com/us/guides/the-top-10-most-expensive-states-for-car-insurance-486233.aspx https://www.insure.com/car-insurance/car-insurance-rates.html https://www.bankrate.com/insurance/car/states/ https://www.marketwatch.com/guides/insurance-services/car-insurance-arizona/ https://www.insurancethoughtleadership.com/auto-insurance/10-most-expensive-states-car-insurance
The Dangers of Project Russia
A wonderfully frightening read. My friends and family will attest, that many times I have stated that we are in open warfare with Russia in the internet/ technological realm of things. The Russia Information Warfare Manual is a very good read. The books offered a detailed program of spiritual warfare against Western democracies culminating in Read More …
What are Cascading Style Sheets?
CSS, short for Cascading Style Sheets, is a stylesheet language used to control the appearance and layout of web pages. Introduced by the World Wide Web Consortium (W3C) in 1996, CSS separates the content of a website (structured with HTML) from its visual presentation, allowing developers to create aesthetically pleasing and user-friendly designs. Core Concepts Read More …