Background Image

Developer Blog

Found 20 results.

Oct 02

LoJax Malware Discovered On Laptop

The UEFI boot-loader, or Unified Extensible Firmware Interface is: An arguably superfluous step towards improving the layer of hardware abstraction recognized at boot... Which essentially means that non standard computer and rtos type systems with (strange arrays?) - might still have options for running/booting "software" in a manner consistent with ordinary boot-loaders, which are of course fairly standardized. PC hardware changes slowly enough for most operating systems engineers to write customized loading protocol within a system kernel for every target system with perhaps 2-3 exceptions for ordinary use. 

Read More

Aug 15

Dear Seti


Whether we realize it or not it lies at the heart of earthly communication systems. It is coupled with Microwaves in some cases such as satellite communication. Radio is the backbone of systems like television, wi-fi, bluetooth, cellular, and probably a half dozen other related systems. Radio relies on electricity and magnets to produce a signal most often in patterns that can be translated via receiver in each and every form that I am aware of. Similar systems are employed to send most point to point digital signals, even if they do not rely on radio. In every case these rely on electricity and magnets.

Read More


Not This One

Aug 12

University Of Michigan Creates Very Small Computer

10 times smaller than IBM's small computer

The University of Michigan has created a computer smaller than a grain of rice and it's primary applications will be medical at first. It is presumed that the next hurdle will be a tiny power source that can be sustained at scale. As it stands the device requires light to power it and any interruption causes a loss of data. It is unclear whether University of Michigan is considering other power sources but for now the device uses constant power at a micro scale. "Nano amperage," is the scale, and for comparison purposes one must note that a Milliwatts are a million times more energy than this device is using. 

Read More

Jun 27

Sweet Tee Quilts

I had to pause from my usual tech only blogging to bring your attention to an amazing local talent. One of our new neighbors makes these quilts and I was pretty impressed with what I saw. I won't load an entire gallery here but rather will direct you to their website and suggest you share the link with your friends who are into DIY and Sewing. 

Read More

May 03

The Vinegar Tasters

Only Lao Tzu is smiling in the picture. The other 2 men are meant to be Buddha, and Confucius. Buddha believed the world was Samsara, an illusion in which the wheel of suffering needed to be escaped. Confucius believed the world was meant to be overcome with discipline, ergo; "sour". Why then is Lao Tzu smiling? Vinegar was not only a representation of life, but also of; decay, and forward thinking. Vinegar is and was made through a process of fermentation much as wine can become a vinegar under the right conditions. In tasting what is arguably not simply vinegar as, "life" one may recognize that this thinking was upon the direction the process of life may go. Tasting the product of a belief or a process is almost a theme of most Eastern philosophical writing. Much as many today might stand in awe of certain technological wonders, and either like or dislike the end result. 

Read More

Apr 08

The Near Future Of Technology

A look at the near future of automation tech, and some of the implications. 

Read More

Mar 11

Mandela Effect Explored

No matter how you spell Berenstain bears there are bizarre examples everywhere that seem to defy explanation of the now ubiquitous Mandela Effect. The central theme being events that large numbers of people recall being different than current media (mostly) can confirm. Everything from JFK's assassination to Jif peanut butter seem to be affected so we'll dive in and try to talk a bit about the far out science that might account for some of this phenomena.

Read More

Mar 03

Interesting AI Projects Currently In Development


Read More

Feb 13

Blogging In Neutral


Historically my articles have varied from intensely personal and spiritual topics to clinical technical evaluations with minimal narrative. Blogging in neutral is a bit closer to descriptive blogging, which perhaps, in spite of my narrative, is precisely how one teaches this technique.  Knowing what to say without needing to elaborate is a practical exercise for descriptive blogging but to truly blog in neutral one must occasionally abandon the idea of the reader needing total clarity to get the gist of what is meant to be conveyed.

Read More

Feb 05

EternalChampion EternalRomance EternalSynergy Ported To All Versions Of Windows

The Shadow Brokers - A group claiming to have stolen this code from the NSA - This code was included in the April 2017 Shadow Brokers Dump which was reported by Bleeping Computers on April 14th. A security researcher has ported the exploits to work on every existing version of Windows. The full article by Bleeping Computers can be found here. 

Security researcher Sean Dillon, aka @zerosum0x0, is who ported the Microsoft Server Message Block (SMB) exploits to work on Windows versions released over the past 18 years. - CSO reporting here on the exploit vectors.

The Shadow Brokers activities are reasonably well documented, and articles like this one from The Atlantic give an overview of their general representation by small media. These ported exploits in question were not altogether as popular as Eternal Blue (Used in Wannacry and related ransomware) but as there are now open source projects on Metasploit for these vulnerabilities/exploits, I suspect we'll be hearing more about this in the near future.     

Read More

Jan 23

Ransomware 2017-2018

By the 3rd quarter of 2017 64% of malicious email attacks contained one form of ransom ware or another. These attacks are on the rise so it seems prudent to disclose some information regarding these attacks, and perhaps some strategies for prevention and removal. Below we'll list the top 10 ransom ware attacks and below that some specific steps that can be taken.

Read More

Jan 05

Meltdown And Specter

Everything you know about hacking is probably going to change soon. Specter and Meltdown are "among" the first vulnerabilities that potentially make use of weaknesses in isolation layers. Layers that generally are protected from programs that might try to bypass them through more conventional exploitation. The x86 addresses and sinkholes - which are only documented by the manufacturers of processors in ways that read like censored encyclopedias, are in fact being documented in the wild by a few hackers - if not many. This means that anyone who knows how to fuzz a processor's microcodes and has enough time on their hands can in point of fact find exactly the kinds of exploitable snippets of microcode that would make use of vulnerabilities like the ones we are discussing.

Read More

Dec 13

Why Kaspersky Is Now Banned From US Government Computers

Kaspersky Labs has a rich history as the maker of the worlds first true antivirus product. The company introduced heuristics based antivirus ages ago and long before any of it's competition. The company is based in Moscow and has operated well above the expected standard for a normal antivirus product. So why has the US government banned it's use recently? Are they really working with Russian government? Where is the evidence?

Read More

Dec 12

The Future Of Bitcoin

Litecoin shot up over the last few days giving rise to the uninformed masses (many of whom were journalists) once again berating Bitcoin as something that will inevitably fail. Between articles citing that "pump and dump" is the future of bitcoin, and that it is valueless because it is based on "nothing." Fiat money has been in circulation since 1000 AD and has no intrinsic value. It's first recorded use was in ancient China, and every single US dollar is a form of Fiat money since we abandoned the gold standard in 1971. Credit cards, are literally a system of debt at interest against valueless fiat currency, and at a fixed rate against even more valueless currency, even that still seems to be going strong.

Read More

Nov 15

Parallel Computing Vs Cloud

Imagine for a moment you keying up serious computer with real muscle. One of those fancy $40,000 Puget Systems jobs. You login to a server and see a distributed network waiting for a command, everything is pristine, a controller GUI - no even better a CLI list in front of you shows which resources on which machine are just waiting for your command. Now of course the question becomes, "Which process on which machine do you actually need to do what?" If what you needed was to solve a massive resource issue, you might need to break it into components and let the machine solve it in Parallels. 

Read More

Nov 14

Vulnerability Assessment Tools

Whether you prefer Windows or Linux there are steps you can take to improve your system's security and network topology. Step 1 is always information gathering, and that is true of your host system as well. No matter if you are a Pen Tester or just feeling anxious about people sniffing around your PC, these tools help.

Read More


Nov 14

Simulation Theory

By now you may have heard of this notion that everything could be "just a simulation." Chances are you haven't heard some of the supporting evidence, so I figured I'd endeavor to throw some of that in front of you here,

Read More

Nov 13

A Fair Raspberry Pi3 Review

In the past few weeks I've managed to test several operating systems on the raspberry pi 3 in spite of several technical difficulties. I look forward to covering more about what works, what doesn't, and what needs to be fixed in the coming weeks.

I'll say it's as good as it can be for what it is currently, if it gets chrome support it will be 5 stars but for now at best I have to say 3.5 

Mind you I love it with Dietpi and Ubuntu Mate as you'll see below:

Read More

Nov 13

Google's Bounty Hack

Mashable mentioned in an article, that Google is looking for hackers to participate in their challenge. The goal is of course to pay out $1000 in addition to the reward from any given app exploited and reported. To quote the article: "Here's how it works. If you find a security vulnerability in one of the participating apps, you can report that vulnerability to the developer, and work with them to fix it. When the problem has been resolved, the Android Security team will pay you $1,000 as a reward, on top of any reward you get from the app developer."
As an example of what they might expect - I'll offer the following:

Read More

Nov 13

At Home Pen Test For Kali

Whether you are just looking for something to do with a weekend, or are trying to get enough experience with testing to start a career in Cyber Security, practical exercises can be hard to come by. I'll share a few videos here and make a few suggestions, and depending on the questions we get this might become a regular feature here.

Read More