Published inLevel Up CodingSecurity Research Ethics ReviewWhat’s the subject, Kenneth?Apr 22, 20212Apr 22, 20212
Published inLevel Up CodingLet’s not use default passwords, m’kay?Or, “How I integrated python-secrets with Splunk’s Attack Range framework, and how you can do the same for your open source project!”Jan 4, 2021Jan 4, 2021
Published inLevel Up CodingInsight into network packet capturesSaying “PCAP, or it didn’t happen!” is all well and good but if you can’t see into the PCAP, how do you know what happened?Sep 7, 2020Sep 7, 2020
Published inLevel Up CodingDiving into sandbox-captured malware dataLooking for malware in all the right places (with the right tool!)Jun 11, 2020Jun 11, 2020
Published inThe StartupA look at recent updates to three professional ethical codesAdvancing ethical thinking regarding responses to cyber crimeFeb 24, 2020Feb 24, 2020
What is the real cost of abandoning ethics in America?Respect, beneficence, and justice must be universal or else they are meaningless.Sep 4, 2019Sep 4, 2019
Published inThe Startup20 Years of DDoS: August 17, 1999The University of Minnesota was kept off-line for three days, and I was kept busy for weeks.Aug 17, 2019Aug 17, 2019
Published inThe Startup20 Years of DDoS: August 5, 1999Something is happening, but what?Aug 6, 2019Aug 6, 2019
Published inThe Startup20 Years of DDoSPart 0: The Build Up to Distributed Denial of ServiceJul 23, 2019Jul 23, 2019