unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Astrophotography Tutorial: Northern Lights Chasing in Iceland
There’s nothing quite as magical as seeing a bright green and pink Aurora Borea...
2018-10-22 06:20:51 | 阅读: 133 |
收藏
|
www.zdziarski.com
aurora
foreground
lens
shot
exposure
Living with Depression in Tech
I’ve been trying to avoid writing about depression for a while now. Almost nobod...
2018-08-23 11:39:38 | 阅读: 115 |
收藏
|
www.zdziarski.com
depression
feeling
deserve
unhealthy
How Social Media Changed Us
The current young generation will soon have grown up without ever knowing what i...
2018-03-23 21:51:42 | 阅读: 112 |
收藏
|
www.zdziarski.com
relate
opinions
dinner
friendships
Joining Apple
I’m pleased to announce that I’ve accepted a position with Apple’s Security Engi...
2017-03-14 23:15:56 | 阅读: 110 |
收藏
|
www.zdziarski.com
security
minded
conscience
sacred
interests
Attacking the Phishing Epidemic
As long as people can be tricked, there will always be phishing (or social engin...
2017-02-17 07:21:53 | 阅读: 128 |
收藏
|
www.zdziarski.com
phishing
overlay
requiring
Protecting Your Data at a Border Crossing
With the current US administration pondering the possibility of forcing foreign...
2017-02-10 09:49:29 | 阅读: 108 |
收藏
|
www.zdziarski.com
backup
security
burner
crossing
passwords
Slides: Crafting macOS Root Kits
Here are the slides from my talk at Dartmouth College this week; this was a basi...
2017-02-03 11:13:36 | 阅读: 144 |
收藏
|
www.zdziarski.com
kits
deck
security
crafting
slides
Resolving Kernel Symbols Post-ASLR
There are some 21,000 symbols in the macOS kernel, but all but around 3,500 are...
2017-02-03 00:32:17 | 阅读: 182 |
收藏
|
www.zdziarski.com
memory
developers
lc
snare
symtab
Technical Analysis: Meitu is Junkware, but not Malicious
Last week, I live tweeted some reverse engineering of the Meitu iOS app, after i...
2017-01-27 03:48:09 | 阅读: 127 |
收藏
|
www.zdziarski.com
meitu
trackers
malicious
existed
jailbroken
Configuring the Touch Bar for System Lockdown
The new Touch Bar is often marketed as a gimmick, but one powerful capability it...
2017-01-18 07:34:57 | 阅读: 134 |
收藏
|
www.zdziarski.com
hibernate
pmset
fingerprint
machine
lockdown
Backdoor: A Technical Definition
Original Date: April, 2016A clear technical definition of the term backdoor has...
2017-01-13 23:00:45 | 阅读: 110 |
收藏
|
www.zdziarski.com
software
security
requirement
backdoors
On Christianity
I’ve often been asked why an intellectual type guy such as myself would believe...
2017-01-11 14:00:53 | 阅读: 140 |
收藏
|
www.zdziarski.com
god
jesus
bible
christians
On NCCIC/FBI Joint Report JAR-16-20296
Social media is ripe with analysis of an FBI joint report on Russian malicious c...
2017-01-07 00:46:04 | 阅读: 114 |
收藏
|
www.zdziarski.com
russia
positives
dnc
classified
clapper
San Bernardino: Behind the Scenes
I wasn’t originally going to dig into some of the ugly details about San Bernard...
2016-11-02 22:29:42 | 阅读: 111 |
收藏
|
www.zdziarski.com
backup
comey
agenda
encryption
assistance
"Sorry, this database f="https://www.zdziarski.com/blog/?p=7325" title="Read More">
Read More
General . Opinion . PoliticsE...
2009-9-24 19:44:0 | 阅读: 9 |
收藏
|
Zdziarski's Blog of Things - www.zdziarski.com
christian
god
church
jonathan
Previous
3
4
5
6
7
8
9
10
Next