Website:

Incoming Links:

Subscribe to RSS:
The blog post is a cease and desist letter from the Maryland Department of Transportation Maryland Transit Administration to Michael Orlitzky regarding the operation of a website providing fraudulent fare tickets. The letter warns...
The blog post is about the security features in CharmPass, and how CharmBypass gets around them. It discusses the mobile ticketing system, security features, and the security features present on a CharmPass ticket. The author also...
The blog post introduces CharmBypass, a way to ride mass transit in Maryland for free. It is a mobile-only website that allows anyone to use it and can be downloaded and built by anyone. The post discusses the legality of using Ch...
The blog post discusses how to bypass the coin system in CSC ServiceWorks laundry machines to get a refund. It details the predatory practices of CSC ServiceWorks and provides step-by-step instructions on how to short-circuit the ...
The blog post discusses the security vulnerabilities associated with hardlinks and symlinks on UNIX systems, and the challenges in avoiding these vulnerabilities. It also delves into the POSIX standard and the implications for cro...
The blog post discusses the Gentoo GLEP81 user package guidelines, providing advice on creating user and group packages, and pointing out exceptions to the rules. It emphasizes using the defaults and avoiding setting unnecessary v...
The blog post discusses the lost treasure of language design and the importance of execution in programming languages. It emphasizes the need for a formal specification, stability, and compilation in programming languages. The pos...
The blog post discusses the issues with Let's Encrypt certificates, highlighting that they provide no real security, automatic renewal is insecure, and manual renewal is time-consuming. It also points out that HTTPS is a trap and ...
The blog post discusses the Lagrange multiplier theorem and its application in solving optimization problems. It explains the necessary conditions for optimality in an optimization problem and the intuition behind it. The author a...
The blog post discusses the attempt to save Linux filesystem ACLs, which are a flexible way to grant permissions on files within an operating system. It explains the problems with POSIX ACLs and introduces RichACLs as a potential ...