Hyprocrisy of startup culture

Start-up companies often pride themselves on their unique company cultures, values, and mission statements. They promise their employees a supportive and inclusive work environment, opportunities for growth and development, and the chance to be a part of a team that is changing the world. However, many start-ups fall short when... [Read More]

Why The Batman feels so personal

“Thursday, October 31st. The city streets are crowded for the holiday. Even with the rain. Hidden in the chaos is the element, waiting to strike like snakes. And I’m there too. Watching. 2 years of nights have turned me into a nocturnal animal. I must choose my targets carefully. It’s... [Read More]

The Science of akashic field

The Sanskrit word akasha, translated as both “ether” and “space”, refers specifically to the vibratory element that is the subtlest in the material world, the “screen on which the image of the body and all nature is projected.” Ether-permeated space is the boundary line between heaven, or the astral world,... [Read More]

How to study based on how memory works

Memory works (to put it simply) in 3 stages: attention, encoding (storing/associating with other info), and retrieval(remembering). To optimize the final stage, you have to optimize the first two stages. i.e., pay attention to the material, and encode it well. (I’ll explain below.) Also, if you repeat the process, you reinforce it. By retrieving... [Read More]

Socratic dialogue

1. What is a Socratic Dialogue? Socratic dialogue is a formal method by which a small group (5-15 people), guided by a facilitator, finds a precise answer to a universal question (e.g. “What is happiness?”, “What is integrity?”, “Can conflict be fruitful?”, etc.). Socratic dialogue is not to be confused... [Read More]

Problem solving and the art of the convincing argument

Introduction Mathematics is used by engineers to solve problems. This usually involves developing a mathematical model. Just as when building a working model aeroplane we would hope to include all the important features, the same thing applies when building a mathematical model. We would also like to indicate the things... [Read More]

Crash Course in x86 - Part I

Knowledge of x86 is important in security fields like malware analysis, vulnerability research and exploit development. The only prerequisite is to know the basics of C or C based languages like Java. Bits, bytes, words, double words The data “types” in 32 bits assembly are bits, bytes, words, and dwords.... [Read More]

Memory exploit mitigation techniques

MEM uses multiple types of mitigation techniques to handle the exploit, depending on which technique is most appropriate for the type of application. For example, both the StackPvt and RopHeap techniques block the exploits that attack Internet Explorer. MEM uses the following types of mitigation techniques: Force Data Execution Prevention... [Read More]

GET VPN

To provide a true full mesh or even dense partial mesh of connectivity, tunnel-based solutions require the provisioning of a complex connectivity mesh. Such a complex mesh not only has higher processor and memory requirements, but is difficult to provision, troubleshoot, and manage. Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces... [Read More]

CRL vs OCSP

CERTIFICATE REVOCATION LISTS A CRL is a list of revoked certificates that have been issued and subsequently revoked by a given Certification Authority. Certificates may be revoked for a number of reasons including failure or compromise of a device that is using a given cert, compromise of the key pair... [Read More]