October 11, 2014| www.netmeister.org
A look at diversity of MX records across all gTLDs and the Top 1M domains, indicating where SMTP is concentrated and what organizations might have broad access to the world's emails.| www.netmeister.org
It is a truth universally acknowledged, that any developer accessing a web service must be in want of using 'curl -k'. But why?| www.netmeister.org
A quick explanation of the differences between network failures most commonly observed in day to day operatoins. And no, it's not (always) DNS.| www.netmeister.org
This article was first posted as part of the SysAdvent| www.netmeister.org
As noted in RFC2223[1], many users read| www.netmeister.org
May 23, 2015| www.netmeister.org
June 15th, 2015| www.netmeister.org
August 12th, 2015| www.netmeister.org
October 12th, 2015| www.netmeister.org
October 13th, 2015| www.netmeister.org
November 5th, 2015| www.netmeister.org
January 16th, 2016| www.netmeister.org
February 28th, 2016| www.netmeister.org
March 9th, 2016| www.netmeister.org
March 14th, 2016| www.netmeister.org
March 27th, 2016| www.netmeister.org
April 8th, 2016| www.netmeister.org
/*| www.netmeister.org
May 7th, 2016| www.netmeister.org
June 23rd, 2016| www.netmeister.org
July 11th, 2016| www.netmeister.org
September 23rd, 2016| www.netmeister.org
October 31st, 2016| www.netmeister.org
December 5th, 2016| www.netmeister.org
January 9th, 2017| www.netmeister.org
February 28th, 2016| www.netmeister.org
Too many tools and scripts create temporary files in an unsafe manner. Here's what could go wrong when you don't mktemp.| www.netmeister.org
September 17th, 2017| www.netmeister.org
November 3rd, 2017| www.netmeister.org
January 27th, 2018| www.netmeister.org
February 01, 2018| www.netmeister.org
March 22nd, 2018| www.netmeister.org
March 28th, 2018| www.netmeister.org
April 6th, 2018| www.netmeister.org
With these restriction, you can reasonably control any| www.netmeister.org
February 20th, 2019| www.netmeister.org
March 8th, 2019| www.netmeister.org
May 7th, 2019| www.netmeister.org
September 28th, 2019| www.netmeister.org
October 10th, 2019| www.netmeister.org
November 1st, 2019| www.netmeister.org
January 02, 2020| www.netmeister.org
A look at what places your browser phones home to upon startup. The results may not surprise you.| www.netmeister.org
A quick summary of the AWS EC2 resources needed to create an IPv6-enabled or dualstack instance.| www.netmeister.org
A summary of how to confine processes to individual CPUs, using Processor Affinity (aka 'CPU Pinning') and CPU sets on NetBSD.| www.netmeister.org
Sure, we all pretend to know them, but rarely do we think they apply to us. Your manager certainly doesn't...| www.netmeister.org
Nope, you don't know how to validate an email address. Even if you think you'd get the domain part right, fuggeddabout the local part. Seriously.| www.netmeister.org
This document is intended to help you decide how to share confidential information with others. It describes in some detail the various trade-offs, assumptions, and risks associated with each approach.| www.netmeister.org
A discussion of why most information security efforts do not make economic sense. Sorry, no solutions.| www.netmeister.org
An incomplete list of (technical) things just about anybody working in Information Security would benefit from knowing.| www.netmeister.org
Just how many weird Resource Records can you stuff into a zone file? And what do these weird RRs actually return?| www.netmeister.org
How to add DuckDuckGo Tor OpenSearch as the default search in Firefox.| www.netmeister.org
Everybody knows the small number of top-level domains in the DNS: .com, .org, .net, .gov, .vermögensberatung and .香港. Let's look at what else we find at the top!| www.netmeister.org
In C, 'main' returns an int. What happens when you don't explicitly return a value, though? C99 provides a return value of 0, but C89... well, that's undefined, my favorite kind of behavior.| www.netmeister.org
The common definition of a 'valid hostname' is often reduced to a simple regular expression, but as the saying goes: 'Now you have two problems.' Because hostnames are DNS labels and those... well, it's the DNS. All bets are off.| www.netmeister.org
For historical reasons, inet_aton(3) accepts IPv4 addresses in several silly formats. Let's see what we can do with those...| www.netmeister.org
A look at the different buffer sizes used for various IPC methods, including pipes, fifos, socketpairs, and sockets.| www.netmeister.org
An illustration of how uninitialized stack variables can lead to undefined behavior.| www.netmeister.org
A list of resources and ideas that I wish Open Source projects followed in their handling of security vulnerabilities.| www.netmeister.org
A quick look at a common mistake made when using strncat(3), and how strlcat(3) prevents a possible buffer overflow here.| www.netmeister.org
Soft skills are hard, and everybody's career path different. Some skill sets tend to intersect, however. Here's my simplified breakdown using, what else, Venn diagrams.| www.netmeister.org
November 4th, 2015| www.netmeister.org