This is a transcript of my eponymous presentation at Confoo 2021.
So, What is technical debt? And how do we talk about it?
We’ve all used that term: “technical debt”, “tech debt”, but has it been really useful? We keep struggling with maintenance, development hurdles, and lack of understanding of how our applications are even supposed to behave? Personally, I like my tools to be sharp, and, for me, a mere metaphor doesn’t cut it. So let’s get closer to the matter of the subject.
So first off, the term “technical debt” is a metaphor. It’s a figure of speech…
-Pn Skip discovery phase (treat all hosts as online)
-sS SYN scan
-sTfull TCP scan
-sV version scan
--script-help [default] print script’s info
--script run script
Arbitrary TCP and UDP connections and listens
> nc -z example.com 20-30GNU
> nc -zv example.com 20-30
> nc -l 1234 # server> nc example.com 1234 # client> nc -l 1234 > out.txt # server> nc example.com 1234 < in.txt # clientGNU
> nc -lp 1234
Nearly every character in American Kingpin seems to have wandered in from one Coen brothers movie or another — Ulbricht’s girlfriend is a born-again Christian who runs an erotic photography business; one of his chief confidantes is an undercover DEA agent who begins stealing from him; and the man who discovers his true identity is a nerdy IRS agent who reads every sentence three times.
American Kingpin is written as a drama, but so many events in Ulbricht’s life read as farce. His over-the-top conversion to libertarianism; a disastrous early experience as a psychedelic mushroom farmer; his paying hundreds…
I (Parmy Olson) cover developments in AI, robotics, chatbots, digital assistants and emerging tech in Europe. I’ve spent close to a decade profiling the hackers and dreamers who are bringing the most cutting-edge technology into our lives, for better or worse. I’m the author of “We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency”, (Little Brown, 2012) which The New York Times called a “lively, startling book that reads as ‘The Social Network’ for group hackers.” Having worked out of Silicon Valley I’m now based in London and am obsessing over developments in AI…
César Hidalgo has a radical suggestion for fixing our broken political system: automate it! In this provocative talk, he outlines a bold idea to bypass politicians by empowering citizens to create personalized AI representatives that participate directly in democratic decisions. Explore a new way to make collective decisions and expand your understanding of democracy.
As I’m spinning up new machines and VMs, and at the recommendation of BHIS, I looking at the CIS Benchmarks.
Checkout my ongoing Ansible implementation:
Got a used Dell PowerEdge R900 for $300. This beast comes with:
That makes it a good enough platform to build a virtual lab.
For the little story, R900 actually means something:
Cheap and powerful, but big and heavy, not your average tower.
Ethernet, with Wireless LAN, is part of the IEEE 802 family of standards.
The services and protocol specified in IEEE 802 map the physical layer and data link layer of the OSI model.
An Ethernet packet (Layer 1) contains a Ethernet frame (Layer 2). An Ethernet frame is made of a MAC destination, a MAC source, a payload and a CRC error detecting code.
“No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn’t so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests.
Klimburg is a leading voice in the conversation…
50% solution finder at @ExperiencePoint / 50% endurance cyclist. Will train for food and burn it for adventures.