• LOGIN
  • No products in the cart.

Blog 4

This is another blog styl 4

A Summary of New Nmap Features from Blackhat/DEFCON 2008

A random, innocent tweet by Gunnar Peterson (@oneraindrop) got me emoting about whether or not Information Security should be viewed/pitched …Read More

Profile PhotoGerald BusingeMay 23, 2025

10 Things Everyone Should Know About the Middle East

As George Bush hopefully taught us, it doesn’t matter if you think you’re doing good when you commit acts that …Read More

Profile PhotoGerald BusingeMay 23, 2025

Take From Me and Give to Him: A New Perspective on Prayer

Christians love to rail against hateful language in the Koran, saying that the extremist teachings there can be used to …Read More

Profile PhotoGerald BusingeMay 23, 2025

Indulgence as God

So a fellow infosec buddy of mine, Hoff, wrote a great piece about how Brock Lesnar is like Cisco. His …Read More

Profile PhotoGerald BusingeMay 23, 2025

How to Include WordPress Components in Your Custom Web Pages

I took the serious risk of correcting a friend today (privately, via Twitter DM) in regard to his use of …Read More

Profile PhotoGerald BusingeMay 23, 2025

End of an Era: It’s Time to Stop Making Fun of Microsoft Security

This is one of the best refutations of the standard creationist arguments I’ve seen in a short video format. Combined …Read More

Profile PhotoGerald BusingeMay 23, 2025