![](https://i0.wp.com/sveoti.net/wp-content/uploads/2015/07/DSCF0005.jpg?fit=560%2C420&ssl=1)
This gallery contains 117 photos →
This gallery contains 117 photos →
This gallery contains 21 photos →
This gallery contains 1 photo →
This gallery contains 4 photos →
There is this place called Casey’s Crab Company. The wife and I were on our way to a dinner with some friends from work. We tried to get out of Washington DC in a timely manner, but slowly watched the…
This gallery contains 6 photos →
There are no absolutes including the absence of absolutes. As such any discussion of adversary sophistication is whimsical at best and likely reliant of chains of logic subject to breaking at their weakest link. If you can handle that then…
I’ve long been a proponent of sharing threat intelligence. The technical level of this sharing is usually at the indicator of compromise (IOC) level. There are several protocols that allow tools to share these IOCs rapidly. IOCs are gathered through…
Many people are talking about the attribution of the Sony hack. Was it or was it not North Korea? I do not care. I thought I would talk about a couple of things in driving towards attribution and analysis of…
I am posting this mostly because my daughter asked for the recipe. I haven’t made this for a long time, but it is a nice alternative to the spicy chilis. This is sweeter and the molasses gives it a rich…
This gallery contains 4 photos →
This gallery contains 1 photo →
This gallery contains 1 photo →
This gallery contains 2 photos →
This gallery contains 1 photo →