Can you write a self-replicating virus in python? I gave it a try.
May
Can you write a self-replicating virus in python? I gave it a try.
Nov
Android is great but from a privacy perspective there is a lot to be desired.
At least some of it can be fixed by installing FOSS (Free & Open Source Software) alternatives to common apps. Here I have assembled some of my favorites – Enjoy!
Jan
I made a Proof of Concept exploit (two actually) for the new Polkit CVE posted yesterday. Find a description and code here.
Jan
This is just a simple trick to get ctrl-z in bash to toggle a process between foreground and background.
A small but useful idea.
Oct
A new vulnerability has been discovered that makes it possible to get a privilegded process to core dump in a restricted area.
This can via a few nifty tricks be abused to gain root access to a linux system
Sep
The cyber crime unit of the Danish police has put out a boot2root box to find relevant applicants for a job as web specialist.
I could not resit trying it out.
Jun
What happens if you put a funky format string as SSID for your wifi AP? For IPhones it can have an unexpected outcome.
Jun
Have you ever shared a picture of your Danish social security card (in Danish: sundhedskortet) online? Maybe with a finger across to cover the secret number?
Think you’re safe from identify theft? probably not!
Mar
I started the endeavour into the world of online hacking training/games back in December. Now, 100 days later, I will give a short update.
Jan
Have you ever pasted some random multi-line text to the bash shell ? If you have, then you will know how annoying this is. So here is the fix!