unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Auth Flows in a Partitioned World
Back in 2019, I explained how browsers’ cookie controls and privacy features present challenges...
2023-4-12 23:55:59 | 阅读: 22 |
收藏
|
text/plain - textslashplain.com
postmessage
flows
subframe
popup
Explainer: File Types
On all popular computing systems, all files, at their most basic, are a series of bits (0 or 1),...
2023-4-6 00:2:25 | 阅读: 24 |
收藏
|
text/plain - textslashplain.com
windows
software
reliably
sniffing
security
How Microsoft Edge Updates
When you see the update notifier in Edge (a green or red arrow on the … button)...
2023-3-25 20:41:49 | 阅读: 17 |
收藏
|
text/plain - textslashplain.com
microsoft
windows
tabs
chromium
speak
Attack Techniques: Spoofing via UserInfo
I received the following phishing lure by SMS a few days back:The syntax...
2023-3-23 05:24:4 | 阅读: 29 |
收藏
|
text/plain - textslashplain.com
userinfo
phishing
security
microsoft
Going Electric – Solar
For years now, I’ve wanted to get solar panels for my house in Austin, both because it feels mor...
2023-3-20 20:44:57 | 阅读: 13 |
收藏
|
text/plain - textslashplain.com
solar
panels
austin
battery
roof
Improving Native Message Host Reliability on Windows
Previously, I’ve written about Chromium’s Native Messaging functionality that allows a browser e...
2023-3-17 06:30:5 | 阅读: 25 |
收藏
|
text/plain - textslashplain.com
windows
chromium
debugger
crbug
showwindow
Attack Techniques: Open Redirectors, CAPTCHAs, Site Proxies, and IPFS, oh my
The average phishing site doesn’t live very long– think hours rather than days...
2023-3-17 05:48:57 | 阅读: 21 |
收藏
|
text/plain - textslashplain.com
attacker
attackers
ipfs
malicious
victim
Slow Seaside Half
After my first real-world half marathon in January, I ended up signing up for t...
2023-3-2 05:30:45 | 阅读: 15 |
收藏
|
text/plain - textslashplain.com
austin
ended
miles
beach
airbnb
Q: “Remember this Device, Doesn’t?!?”
Q: Many websites offer a checkbox to “Remember this device” or “Remember me” bu...
2023-2-11 02:7:45 | 阅读: 17 |
收藏
|
text/plain - textslashplain.com
expire
developer
microsoft
f12
broke
Attack Techniques: Blended Attacks via Phone
Last month, we looked at a technique where a phisher serves his attack from the...
2023-2-9 22:25:0 | 阅读: 28 |
收藏
|
text/plain - textslashplain.com
microsoft
lure
phishing
charged
navigation
A New Era: PM -> SWE
tl;dr: As of last week, I am now a Software Engineer at Microsoft.My path to becoming a Prog...
2023-2-7 04:36:19 | 阅读: 19 |
收藏
|
text/plain - textslashplain.com
microsoft
fiddler
developer
security
software
A Year of Intention
Posted byericlaw2023-02-04Posted inrunningTags:fitness, ProjectK...
2023-2-5 03:9:3 | 阅读: 16 |
收藏
|
text/plain - textslashplain.com
commenting
pounds
peak
04posted
couch
Couch to Half Marathon: Closing My First Year of Running
On February 11th, 2022, I took my first jog on my new treadmill, a single mile at 5mph. I’d been...
2023-1-24 05:35:16 | 阅读: 12 |
收藏
|
text/plain - textslashplain.com
mile
pace
beat
crossed
pacer
Defense Techniques: Reporting Phish
While I have a day job, I’ve been moonlighting as a crimefighting superhero for almost twenty ye...
2023-1-20 01:15:27 | 阅读: 23 |
收藏
|
text/plain - textslashplain.com
phishing
phish
grader
cloaking
phishers
SlickRun
While I’m best known for creating Fiddler two decades ago, eight years before Fiddler’s debut I...
2023-1-13 04:25:12 | 阅读: 20 |
收藏
|
text/plain - textslashplain.com
slickrun
magicword
windows
clipboard
magicwords
2022 EOY Fitness Summary
I spent dramatically more time on physical fitness in 2022 than I have at any o...
2023-1-13 02:24:15 | 阅读: 14 |
收藏
|
text/plain - textslashplain.com
miles
alcohol
summer
beer
treadmill
Attack Techniques: Priming Attacks on Legitimate Sites
Earlier today, we looked at two techniques for attackers to evade anti-phishing filters by using...
2023-1-12 07:17:11 | 阅读: 34 |
收藏
|
text/plain - textslashplain.com
attacker
phishing
malicious
victim
security
Attack Techniques: Phishing via Mailto
Earlier today, we looked at a technique where a phisher serves his attack from...
2023-1-12 06:1:18 | 阅读: 51 |
收藏
|
text/plain - textslashplain.com
victim
attacker
mailto
phishing
phisher
Attack Techniques: Phishing via Local Files
One attack technique I’ve seen in use recently involves enticing the victim to...
2023-1-12 04:24:20 | 阅读: 44 |
收藏
|
text/plain - textslashplain.com
victim
attacker
passwords
eliminate
navigation
ProjectK.commit()
Cruising solo across the Gulf of Mexico last Christmas, I had a lot of time to...
2022-12-18 01:20:55 | 阅读: 19 |
收藏
|
text/plain - textslashplain.com
kilimanjaro
incline
cruise
trip
seemed
Previous
5
6
7
8
9
10
11
12
Next