My latest music video for “Dark Future” is out now, offering a unique visual journey that parallels the song’s genesis. This track was born from a deep dive into the world of future bass, specifically inspired by the insightful techniques and concepts explored in the Native Instruments blog series on how to craft the genre. Read More …
Category: Video
This is the ongoing video feed of the site. Anything I come across will be on this page, so the topics could go from music, to malware, to economic theory pretty darm quickly. I warned you.
Conference Video – A deep look into a Chinese advanced attack
These are the videos from Derbycon 2015:
hacker TV – Understanding buffer overflow exploitation
The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell Everything started with Aleph One’s paper “Smashing the Stack for Fun and Profit”. These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb Read More …
1bb Music VIdeo – Wind Chimes
Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. Running around Chicago doing errands on a rainy day. #shotcutvideo #collage #collagelife #weird #weirdvisualfx #kaleidoscope #kaleidoscopevideos #kaleidoscopeoflife #driving #lsd #chicago #timelapse #groceryshopping #videotour #slipstream #version #version6 #versionsix #Visualart #kaleidoscopevideos #collage #groove #kaleidoscopeart #kaleidoscopeeffect #kaleidoscopevideo #kaleidoscope Read More …
Hacker TV – Hacker Course Buffer Overflow
A first step to become a true Hacker.
21 Youtube Settings That F*ck Small Channels
Here are 21 YouTube settings that can stunt your channel’s growth
Conference Video – Why We are Not Building a Defendable Internet
In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Why You’re Not Getting Paid
Why You’re Not Getting Paid The Streaming Money You Earned (And How To Get It) SF MusicTech 2014