Rob Janssen

All | Unread | Read

Everything Is Broken — The Message — Medium

Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network.

How I stole source code with Directory Indexing and Git

The keys to the kingdom pretty much always come down to acquiring source code for the web application you’re attacking from a blackbox perspective.

Programming Sucks

Every friend I have with a job that involves picking up something heavier than a laptop more than twice a week eventually finds a way to slip something like this into conversation: "Bro,1 you don't work hard. I just worked a 4700-hour week digging a tunnel under Mordor with a screwdriver."

Installing VirtualBox, and Boot2Docker to run Docker Containers in OSX/Windows

This tutorial will mark the beginning of tutorials revolving around Docker, CoreOS, and running applications within Linux Containers. In this first video we will go over differences between virtual machines and docker containers, installing Virtualbox and Boot2Docker, which will allow us to use Dock

Introduction to Docker

dotCloud founder and CTO Solomon Hykes recently stopped by Twitter HQ to show us Docker, an open source project designed to easily create lightweight, portable, self-sufficient containers from any application.Common use cases for Docker include:* Automating the packaging and deployment of applicatio

Docker Cache: Friend or Foe?

Docker is a new container technology that is taking Devops by storm, with many companies moving their applications from running in virtual machines (VMs) over to containers. What does Docker do? It allows you to run many containers on the same host without them interfering with each other.

Line by Line

In the bowels of a business unit, a director got a great deal on a third party software package. He bought it, without talking to corporate IT, and then was upset when it couldn’t gracefully integrate with any of the corporate IT assets.

Why we aren’t using the Gmail API (yet)

When Google announced the new Gmail API in June, we were excited to switch. The new API promised to fix our biggest problem with IMAP: the lack of read-only permissions.

Cryptic genetic variation in software: hunting a buffered 41 year old bug

In genetics, cryptic genetic variation means that a genome can contain mutations whose phenotypic effects are invisible because they are suppressed or buffered, but under rare conditions they become visible and subject to selection pressure.

Indistinguishable from Random

Bodo Möller, Thai Duong, and Krzysztof Kotowicz have just broken the internet again with POODLE[20], a new and devastating attack against SSL.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.