Posted by James on January 19, 2014
… and all I got was this (virtual) T-Shirt.
Sorry. Poor attempt at a joke, and not even technically true; I received two virtual T-Shirts for my Xbox Live Avatar and the blue hat proudly displayed in the picture.
A few months ago I heard of Microsoft’s BlueHat Challenge. Their post explains[......]
Posted by James on July 3, 2013
I was looking at a particularly bad example of a website littered with tens of thousands of spam comments.
There didn’t appear to be a real comment on the entire site, the oldest spam dated back several years and the most recent was barely a few days old. It seemed clear that the site owner eithe[......]
Posted by James on February 7, 2013
A post on the (aptly named) /dev/ttyS0 device hacking blog entitled "Reverse Engineering Serial Ports" reminded me that I had an AMX NXA-WAP250G Wireless Access Point that I’d been meaning to investigate for some time. I thought I’d document the process I went through while reverse enginee[......]
Posted by James on August 24, 2011
While using Google Related some JSON formatted data is requested from Google about each page you visit; that data comes from a URL similar to the one below:
(split over several lines for readability)
The response is much too wordy for me to paste here, but what jumped o[......]
Posted by James on July 30, 2010
I was pointed to the Cyber Security Challenge earlier this week, and eventually stumbled upon the cipher they offer as an “immediate opportunity to test your skills”. Despite not really understanding the point of the exercise or how it related to the other competitions mentioned, I was pleased to se[......]