NL
About
Security Advisories
Advisory: Heap overflow vulnerability in reSIProcate through 1.10.2 (CVE-2018-12584)
Malware Analysis
Tracking down malware infection (April 2011)
Antivirus: Tracking down malware infection #2
AutoPlay Worm
Trojans Transferred Via IRC
Get-Styles Facebook Malware
Bifrost Trojan Horse
Malware
Skype Worm
Fake AV Malware
Msnmsgrs.exe Malware
Malware
Msnmsgrs.exe Malware #2
TDSS/Alureon Bootkit Trojan
Zeus Malware
Conduit Browser Hijacker & Spigot Malware
Trojan Horse
Spigot Widgi Toolbar Malware
Trojan.Agent.PE5, TR/Kazy.58739 Trojan Horses
Rimecud malware
IRC Trojan Horse
Dropper.Generic5.BENN
Blackhole Exploit Kit / SpyEye Rootkit
LeaseWeb hosted malware
Rogue Scanner Malware
Hotmail Trojan.HTML.Redirector
/proc/self/environ LFI and RFI vulnerability tests (since <= August 2011)
Police Ukash Ransomware Trojan (July/August 2012)
DarkComet 5.3.0 RAT (August 2012)
JAVA/Dldr.Treams.CP / Trojan.Win32.Jorik.Nrgbot.agp (aka Win32.Dorkbot.A) (August 2012)
Police Ukash Ransomware Trojan #2 (September 2012)
Skype Worm (October 2012)
Malware spreading via Skype (January 2013)
Gamarue / Andromeda Malware (March/April 2013)
System Care Antivirus Fake AV Malware (April 2013)
VBS backdoor that spreads via USB (December 2013)
Malware that spreads via Facebook (February 2014)
Malware that spreads via a Facebook message attachment (May 2014)
Malware
Malware
Locky Ransomware (March 2016)
Linux/AES.DDoS ELF Malware (June 2017)
Malware (June 2017)
Malware (June 2017)
Norassie (March 2018)
Mirai variants botnets (August 2018)
Flare-On 5 CTF
CryptoNight mining botnet (January 2019)
Sefa miner botnet (January 2019)
Loki bot credential stealer (January 2019)
Urausy ransomware (February 2019)
Cyber Security
AVG free antivirus
KeePass password manager
Let's encrypt: free SSL/TLS certificates
Encryption For Data Theft Prevention
Tor Project: Anonimity Online
Tails
Signal by Open Whisper Systems
OpenSSH
Basic iptables howto
IP sets
Snort network intrusion detection & prevention system
Emerging threats rules
TEMPEST
Wikipedia range blocks
Blacklists
YM unrecognized contact requests
MSN unrecognized contact requests
Suspicious Facebook Account Access
Hotmail phishing / spam
Hotmail phishing / spam 2
Information on scammers targeting a hotmail account
JBoss vulnerability test
AirPush removal
Yahoo spam
Information on scammers pretending to be the Bulgarian National Revenue Agency
Log files / reports
Shodan.io port scans (>= September 2016)
How to verify Googlebot (>= September 2016)
Apache httpd security: why do I see requests for foreign sites appearing in my log files? (November 2016)
Beware of links to Baidu in Skype messages (November 2016)
HTTP requests from D-Link devices (January - May 2017)
HTTP requests from systems with Avtech network cameras (February 2017 - January 2019)
Securing Apache2 on Linux
Deception technology
Domain generation algorithm (DGA)
Fast flux
DNS hijacker
Evil twin attack
The RTLO method (January 2014)
Return-oriented programming (ROP)
United States Cyber Command
American fuzzy lop (fuzzer)
Behavior monitoring combined with machine learning spoils massive Dofoil coin mining campaign (March 2018)
Abuse.ch (ZeuS, Feodo, Ransomware blocklists)
AbuseIPDB
Logs
Floki Bot and the stealthy dropper (November 2016)
Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques (July 18th, 2017)
Dynamic unpacker for Emotet using TitanEngine by d00rt (December 2019)
Security.ipip.net HTTP banner grabbing (January 2019)
White-box testing
SecRepo.com - Samples of security related data
Wireshark tools
Rekall forensics
Software Engineering
GIT
Doxygen
Berkeley sockets
List of TCP and UDP port numbers
Clock skew
WAVE PCM soundfile format
Semaphore (versus mutex)
(Pure) virtual function
Friend function
Thread safety
Reentrancy
Ring buffer data structure
Dr.Dobb's: Lock-free data structures
PID controller
Windows Sysinternals
API Monitor v2
Telerik Fiddler: a free web debugging proxy which can be used to locally decrypt HTTPS traffic
Windows XP targeting with C++ in Visual Studio 2012
VSDebugTool: dump blocks of data to files, load data in memory from files, copy memory and more
Microsoft child process debugging power tool Visual Studio extension
Mutable and immutable objects in Python
Anonymous function
Lambda expressions in C++
Using C++11's smart pointers
Variadic template
Boost C++ libraries
Debugging Windows C++ programs
C++ STL containers reference
Invalidation of STL iterators
Return value optimization
Inside CRT: Debug Heap Management
Debugging Heap Corruption in Visual C++ Using Microsoft Debugging Tools for Windows
Lua (programming language)
Coroutine
Mark Russinovich: Pushing the limits of Windows: virtual memory
IDA evaluation version
Debugging JNI code using Eclipse and Visual Studio
Overview of JNI object references
Component Extensions for Runtime Platforms
MFCMAPI: provides access to MAPI stores to facilitate investigation of Exchange and Outlook issues and provides developers a sample for MAPI development
Google Apps Script
The Google Chrome Breakpad/Crashpad crash reporting system
Mozilla Developer Network
Introduction to using XPath in JavaScript
JavaScript Guide: regular expressions
MDN: Web APIs
MDN: MutationObserver
RFC6455: The WebSocket protocol
Message Session Relay Protocol
RFC4975: Message Session Relay Protocol
Xcode
MacPorts
Safari extensions developer guide: extensions overview
How to create a Safari extension certificate
How to sign a (Safari extension) XAR archive
Installing the Android Development Tools (ADT) Eclipse plugin
Android NDK: ABI management
Android NDK: Standalone toolchains
Android NDK: Application.mk
MIPS64 Architecture
Android 6.0 changes (API level 23)
A guide for tracking down and fixing .text relocations (TEXTRELs)
iOS Audio Session Programming Guide
Address Book Programming Guide
AddressBookCocoa
MSDN: How to register your phone for development for Windows Phone 8
MSDN: Native code for Windows Phone 8
ChatterBox VoIP Windows Phone 8.0 sample app
ChatterBox VoIP Windows Phone 8.1 sample app
Toasts for Windows Phone 8
Network related terminology and RFCs
Jumbo frame
Static routing
SIPp test tool / traffic generator for the SIP protocol
Asynchronous "island" approach to parallelization of genetic programming
Unsupervised learning
Random forest
Monte Carlo algorithm
Numerical integration
Monte Carlo integration
Mersenne Twister PRNG
Universal asynchronous receiver-transmitter (UART)
Mobile-Friendly Test: Is your web page mobile-friendly?
Investing
The evidence-based investor
Buy and hold
Passive investing
Efficient-market hypothesis
Dollar cost averaging
Systematic investment plan
Berkshire Hathaway Inc. shareholder letters
Investing in undervalued companies with wide economic moats
Investing in P2P loans
Cheap international money transfers
Investing in IPOs
Investing in small cap companies weighted by revenue
Investing in companies that perform stock buybacks
Investing in mid cap companies weighted by earnings
An equal weighted S&P 500 index ETF
Investing in companies based on insider sentiment
A low volatility high dividend ETF
Minimum volatility investment strategy ETFs
Investment opportunities
Investing in real estate via REITs
Buying gold
Synthetic versus physical ETFs
Buy the dip versus dollar cost averaging
Ethics
The United Nations Universal Declaration of Human Rights (UDHR)
International Covenant on Civil and Political Rights
Presumption of innocence
The Hippocratic Oath: modern version
Johnson & Johnson credo
Audi alteram partem
Right to silence
Law professor: don't talk to the police
IEEE Code of Ethics
Health
Why babies can learn 2 languages at the same time
American Diabetes Association
Transient Ischemic Attack
Speech Dr. Thomas Szasz against psychiatric coercion
Political abuse of psychiatry
What a psychiatrist learned from 87000 brain scans
Troubleshooting
ASUS "no keyboard detected"
Acer Aspire 1810TZ screen doesn't display anything
Recovering deleted digital pictures from the microSD card (FAT32) in the Sony Ericsson Xperia Arc S (Android) smartphone
Sony VAIO laptop shuts down by itself
Sony VAIO laptop reboots after putting it to sleep
"The User Profile Service failed the logon" error message
Windows 7 setup can't create a new partition or locate an existing one
HP ProBook 4340s BIOS Recovery
Windows 7 Ultimate Service Pack 1 Build 7601 startup repair issue
Windows XP setup stops responding with 34 minutes remaining
What is hiberfil.sys and how do I delete it?
How to: Link to MAPI functions
MAPIInitialize/MAPILogonEx/OpenMsgStore crashes when the available virtual memory of the calling process is in a specific range
How to revert to an earlier version of Office 2013 or Office 2016 Click-to-Run
PuTTY: Using keepalives to prevent disconnection from Telnet/SSH servers
How to keep your Linux SSH session from disconnecting
Copying private identity key to .ssh/rsa_id causes permission denied error during SSH login
Crash when MAPIUninitialize was not called before FreeLibrary of OLMAPI32.DLL (January 2017)
Deploying Windows Phone 8.1 application to a device in Visual Studio 2015 does not work due to missing sshclient.dll
Resolving "This file was generated by an older version of protoc which is incompatible with your Protocol Buffer headers. Please regenerate this file with a newer version of protoc."
Where is Xcode's build folder
Enabling Developer Options (for USB Debugging) on Android >=4.2
Misc
Churnalism
JFK speech before the American Newspaper Publishers Association
Funny TED talks about spam
Google Translate
Tecumseh's prayer
Quotes
Memorable quotes from the movie Denial (2016)
Gospodari na efira
Unsolicited mobile phone calls
Bgmaps
Yellow! Taxi
Online document (PDF) translator
Windows XP symbol files
☰