Avatar
Because Google started to delete hacking related blog posts without using a single brain cell, I had to learn just another framework. Thx Google

recent articles

Hacking Windows 95, part 2
DSploit
WiFi hacking on tablets
BYOPPP - Build your own privacy protection proxy
Stop using MD-5, now!
Attacking financial malware botnet panels - Zeus
Hacking Windows 95, part 1
DNSSEC, from an end-user perspective, part 3
DNSSEC, from an end-user perspective, part 2
Effective blocking of Java exploits in enterprise environments
DNSSEC, from an end-user perspective, part 1
Secure IPv6 deployment checklist think twice, deploy once