Backyard Chickens – Clean the Coop Again

Generally you need to do a full cleaning of your backyard coop/ run/ etc. around once every 3 months. By this, I mean the area around the chickens. The nesting boxes you have to keep much cleaner. Those I try and do about once a month. This is where you chicken is going to lay Read More …

Peter Thiel’s move to the right

Peter Thiel and his potential desire to collapse all things America have been in the US news quite a bit lately. This isn’t the first time I was aware of this overly private person, and I do mean before Hulkamania. I’m not entirely sure when Peter Thiel and his Yarvin-acolytes began to join this movement Read More …

Do you really need to do that Human?

On a warm spring morning, the sun rose over the Johnson family’s backyard, revealing a perfectly manicured lawn, vibrant flowerbeds, and a gleaming new vegetable patch. The yard was the pride of the family, especially Mrs. Johnson, who had spent months cultivating it. But lurking in the coop by the fence was a group of Read More …

clean up /boot (for Ubuntu at least)

Here is a quick set of commands to clean up the /boot partition on an Ubuntu linux system. First check what your kernel version is  so you won’t delete the running kernel image: uname -r Now run this for a list of installed kernels: dpkg –list ‘linux-image*’ | grep ^ii delete the kernels you don’t Read More …

What are the advantages of FASP

The speed increases are achieved by sending larger packets than TCP, not waiting for confirmation that a packet has been received before sending the next one, and only re-sending packets that are confirmed as having been dropped. FASP (Fast and Secure Protocol), used in IBM Aspera, offers significant advantages for cloud data transfer, enabling faster, Read More …

Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion

Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …

Wild Auto Insurance claims in Arizona

https://azcapitoltimes.com/news/2025/03/09/to-lower-costs-for-families-and-businesses-we-must-end-lawsuit-abuse/ How does this affect auto insurance?  Author never says.  They just make the wild accusation, follow it up with a fact, and then double down on their wild accusation.  No evidence as to why they are related. https://www.insurancebusinessmag.com/us/guides/the-top-10-most-expensive-states-for-car-insurance-486233.aspx https://www.insure.com/car-insurance/car-insurance-rates.html https://www.bankrate.com/insurance/car/states/ https://www.marketwatch.com/guides/insurance-services/car-insurance-arizona/ https://www.insurancethoughtleadership.com/auto-insurance/10-most-expensive-states-car-insurance

The Dangers of Project Russia

A wonderfully frightening read. My friends and family will attest, that many times I have stated that we are in open warfare with Russia in the internet/ technological realm of things.  The Russia Information Warfare Manual is a very good read. The books offered a detailed program of spiritual warfare against Western democracies culminating in Read More …

What are Cascading Style Sheets?

CSS, short for Cascading Style Sheets, is a stylesheet language used to control the appearance and layout of web pages. Introduced by the World Wide Web Consortium (W3C) in 1996, CSS separates the content of a website (structured with HTML) from its visual presentation, allowing developers to create aesthetically pleasing and user-friendly designs. Core Concepts Read More …

Conference Video – Win32 Exploit Development With Mona and the MSF Framework

In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team Read More …