hasameli.com
Folksec
https://hasameli.com/folksec.html
Thu 21 January 2016. Information security is a difficult field. It's not only more than a little esoteric in how it works, but the conditions for 'valid' vs. 'owned' change often - much more often, at times, than most people's usual exposure to training for it. This leads to some unfortunate consequences, where people who mean well pass along advice about how to secure things that is outdated or based on an incomplete understanding of threat surfaces. Examples of folksec are things like password generati...
hasameli.com
Hasameli Information Services - Mitigations
https://hasameli.com/category/mitigations.html
Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Thu 21 April 2016. A researcher has discovered undocumented functionality in regsvr32 that allows for arbitrary code execution even in otherwise locked-down environments. Regsvr32, which provides core OS functionality for Windows, has an option available to load scripts from arbitrary network locations. The researcher's description of exploitation is found here. Please note, the . Proudly powered by Pelican.
hasameli.com
Hasameli Information Services - Infosec
https://hasameli.com/category/infosec.html
Thu 21 January 2016. Information security is a difficult field. It's not only more than a little esoteric in how it works, but the conditions for 'valid' vs. 'owned' change often - much more often, at times, than most people's usual exposure to training for it. This leads to some unfortunate consequences, where . Proudly powered by Pelican. Which takes great advantage of Python. The theme is based on Bootstrap from Twitter.
hasameli.com
Hasameli Information Services
https://hasameli.com/archives.html
Archives for Hasameli Information Services. Thu 21 April 2016. Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Thu 21 January 2016. Proudly powered by Pelican. Which takes great advantage of Python. The theme is based on Bootstrap from Twitter.
hasameli.com
Hasameli Information Services - Munin
https://hasameli.com/author/munin.html
Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Thu 21 April 2016. A researcher has discovered undocumented functionality in regsvr32 that allows for arbitrary code execution even in otherwise locked-down environments. Regsvr32, which provides core OS functionality for Windows, has an option available to load scripts from arbitrary network locations. The researcher's description of exploitation is found here. Please note, the . Thu 21 January 2016. Proudly powered by Pelican.
hasameli.com
Hasameli Information Services
https://hasameli.com/index.html
Mitigation for Whitelisting Bypass using regsvr32 - "White Register". Thu 21 April 2016. A researcher has discovered undocumented functionality in regsvr32 that allows for arbitrary code execution even in otherwise locked-down environments. Regsvr32, which provides core OS functionality for Windows, has an option available to load scripts from arbitrary network locations. The researcher's description of exploitation is found here. Please note, the . Thu 21 January 2016. Proudly powered by Pelican.
pando.com
Pando: Time to say no to Lenovo? Still reeling from the Superfish scandal, Lenovo deals with another big security fail
https://pando.com/2015/05/06/time-to-say-no-to-lenovo-still-reeling-from-the-superfish-scandal-lenovo-deals-with-another-big-security-fail
Time to say no to Lenovo? Still reeling from the Superfish scandal, Lenovo deals with another big security fail. May 6, 2015. Share this article on. Share this article on. Share this article on. Share this article on. Lenovo just can't keep its devices secure. Researchers have discovered a " massive security risk. In Lenovo computers. The multiple vulnerabilities could allow hackers to replace legitimate software with malware and remotely control that malicious code without detection. Replace the certifi...
theilluminerdy.com
Unreal Worlds: The Secret History of the Necronomicon
http://www.theilluminerdy.com/2014/02/19/unreal-worlds-the-secret-history-of-the-necronomicon
100 Word RPG Hooks. 5e Monster Manual: Monsters by Challenge Rating Index. Reviews and Media Requests. Unreal Worlds: The Secret History of the Necronomicon. The Secret History of the Necronomicon. Subtitled “From Egypt to Alhazred”) is a short chronology of the origins and evolution of the. Real mythos — when he began peppering his work with references to it as its central theme. Honestly, this in and of itself is not so original (allegedly “real” Necronomicons are common enough. Documentary evidence of...
SOCIAL ENGAGEMENT