Black Lives Matters Protest Support

I’m unable to attend the protests. I am in proximity to very young children and immune-compromised partners, and COVID-19 is still very, very real. But I have my voice, technology, and words. Lots, and lots of words. These are my letters to my Federal, State, and local representatives. Feel free to use as many or […]

REcon 2012

I’ve just recently returned from REcon 2012 and while I heard a couple people express that they had “heard” that some people were more disappointed with this year’s conference compared to prior ones, I personally really enjoyed it and felt it was the best one yet.  I saw and enjoyed more of the lectures this […]

Fame, Trinkets and Cash

Taking place over the last week was the CanSecWest 2010 security conference, with their now annual Pwn2Own contest. For those that are unfamiliar, the Pwn2Own contest presents a number of devices usually consisting of mobile or cellular devices and laptops as targets and allows contestants to attempt to compromise them in some way. These targets […]

SmartPhone Unlock Screens: Moving in the Wrong Direction

I recently purchased the Motorola Droid from Verizon, and am so far very happy with it.  Other than finding the physical keyboard a bit lacking from being extremely spoiled by the Sidekick’s physical keyboard to which no other physical keyboard could ever hope to live up to, I’ve really had no complaints with the device […]

ATARI: What’s in a name?

I have long been fascinated with self-given names, and the effect they have on the entity being named. Having grown up with my roots firmly planted in the computer security underground, I regularly met and dealt with people identified only by their self-given handles (pseudonyms). I soon began to notice that many of these people […]