Explore the fascinating evolution of Knowledge Management from isolated documents to AI-enhanced knowledge graphs, and discover what the future holds for how we capture, connect, and leverage our ideas.| Sébastien Dubois
I’ve been watching all of the posts on social media recently instructing us to prune this and prune that. You’d think if you didn’t prune something the world would end!… The post Five examples of when not to prune first appeared on Jack Wallington | Nature & Gardens.| Jack Wallington | Nature & Gardens
Other things are rarely equal. All things never are. What the ocean does: swell direction and height, wave interval, secondary swell, wind strength, tide (high or low, spring or neap), dawn or dusk, rain or shine, bake or freeze. The contours of the seabed and the beach: where the reef begins, where the sand’s shifted,… Read More »| Driverless Crocodile
Boost your sales with Pipeline Management CRM! With its powerful tools for tracking leads, forecasting sales, and generating reports.| Telecrm Blog
Tana and Obsidian are both awesome. But not for everyone. Here are the reasons why I choose Obsidian over Tana| Sébastien Dubois
Discover why your endless tool customization is actually procrastination in disguise, and how to break free from the tweaking trap.| Sébastien Dubois
Disclaimer: I’m an intermediate surfer. This post is for people a step or two behind me, so your mileage may vary – let me know what I’ve missed in the comments. I’m convinced that most surf coaching videos and websites spend way too much time talking about the pop up* and way too little time… Read More »Surfing: Why does it help to arch your back when paddling? (it isn’t for leverage) – Surf Lessons #8 The post Surfing: Why does it help to arch your back when paddling? (it is...| Driverless Crocodile
Here’s Stephenson, from his Substack: Speaking of the effects of technology on individuals and society as a whole, Marshall McLuhan wrote that every augmentation is also an amputation. I first heard that quote twenty years ago from a computer scientist at Stanford who was addressing a room full of colleagues—all highly educated, technically proficient, motivated… Read More »Neal Stephenson on augmentation as amputation The post Neal Stephenson on augmentation as amputation appeared fi...| Driverless Crocodile
Unlock the secrets to identifying tools and techniques for your niche market. Learn strategies and gain insights to help you thrive in your specific niche.| Azura – Think Brighter
Recently I needed to parse some data embedded in HTML. At first glance it appeared to be JSON, so after pulling the text out of…| GrimBlog
Believe it or not, despite the fact it is 2016 I am still finding LanManager (LM) hashes on internal networks during penetration tests. Although in my experience it is becoming more frequent that L…| GrimBlog
Hazel's true name is Corylus avellana, it's one of our best known wild trees all across Europe. It's been closely tied to humans because of its use in building, fencing and thatch. To grow stems that are straight and roughly the same size, our ancient ancestors struck on the woodland craft of coppicing, to cut| Jack Wallington | Nature & Gardens | nature, landscape and garden design in H...
A recent zero-day vulnerability has been publicly shared revealing a critical issue with the nginx-ldap-auth software package allowing attackers to potentially bypass authentication and disclose ke…| GrimBlog
Some time ago I came across a site that was using xdLocalStorage after I had been looking into the security of HTML5 postMessage. I found that the library had several common security flaws around l…| GrimBlog
TLDR: Domain Users permitted to authenticate to Microsoft SQL databases can use the limited privileges they are granted to run a stored procedure. The stored procedure can be used to send the datab…| GrimBlog
As you would expect, office printers are often identified when conducting a penetration test of an office network. These devices often seem to be overlooked as there are usually more interesting an…| GrimBlog