shanemacaulay.wordpress.com
Hello world! | security-objectives.com
https://shanemacaulay.wordpress.com/2007/09/18/hello-world
Security Objectives semi-formal but unmorderated (for now) blog. September 18, 2007. My poor old Solaris Ultra5 webserver just cant handle PHP / apache / MySQL / netqmail and such, so for the time being. It’s just me and my word press. I’ll be posting some relevent news about my new company Security Objectives. This’ll be the biz blog! Here’s my new puppy. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public).
shanemacaulay.wordpress.com
About | security-objectives.com
https://shanemacaulay.wordpress.com/about
Security Objectives semi-formal but unmorderated (for now) blog. Security Objectives is an elite software security development company focused on application security flaw and fix’s. Security is often neglected until the last minute, when the problem is intractable and the decision to enact a realistic model for success, with business context in mind, rarely chooses the hard road. 2 Responses to “About”. April 3, 2008 at 3:50 pm. Help will be appreciated. August 29, 2008 at 4:42 am. Well, our product wil...
shanemacaulay.wordpress.com
Seriously in-depth web delivered content | security-objectives.com
https://shanemacaulay.wordpress.com/2007/10/26/seriously-in-depth-web-delivered-content
Security Objectives semi-formal but unmorderated (for now) blog. Seriously in-depth web delivered content. October 26, 2007. One of my friends was asking me why I have so much hard drive space, and it’s really because the speed at which good resources evaporate, you’d think with all the storage these days there would be no exothermic information transfers et al. But they are usually corrupted by knowledge and may lapse in the simple things that otherwise can take hours to find. The reason I had to dig in...
shanemacaulay.wordpress.com
October | 2007 | security-objectives.com
https://shanemacaulay.wordpress.com/2007/10
Security Objectives semi-formal but unmorderated (for now) blog. Seriously in-depth web delivered content. October 26, 2007. One of my friends was asking me why I have so much hard drive space, and it’s really because the speed at which good resources evaporate, you’d think with all the storage these days there would be no exothermic information transfers et al. But they are usually corrupted by knowledge and may lapse in the simple things that otherwise can take hours to find. The reason I had to dig in...
systemofsystems.wordpress.com
Tickle! See? Gee, I … | System of Systems
https://systemofsystems.wordpress.com/2011/03/03/tickle-see-gee-i
Gee, I …. 3Mar2011= [Thu] at [23:12] · Filed under 0day. Ah, TCL, the Tool Command Language. Based on the research conducted by myself and my colleagues here at Security Objectives. Outlines the theoretical backbone of the phenomena in the first half and presents cases of real-world exploitation in the second half. However, the background theory along with some general programming and Hyper-Text Transfer Protocol knowledge is recommended in order to gain a firm understanding of the exploits themselves.
shanemacaulay.wordpress.com
More Interesting Visualizations | security-objectives.com
https://shanemacaulay.wordpress.com/2007/09/19/more-interesting-visualizations
Security Objectives semi-formal but unmorderated (for now) blog. September 19, 2007. Here are a few of the papers that I took a look at that were interesting, at least the papers I read in the past couple days. Http:/ www.iam.unibe.ch/ scg/Archive/PhD/greevy-phd.pdf. 184 pages, really comprehensive, not that flashy though. Http:/ softeng.polito.it/events/WESRE2006/02Fronk.pdf. Every time I see something that’s “Reverse Engineering” it ends up being Java? This “A bug’s Life” Visualizing ...I’ve been...
shanemacaulay.wordpress.com
Internet Explorer 3D Memory Visualization | security-objectives.com
https://shanemacaulay.wordpress.com/2007/09/19/internet-explorer-3d-memory-visualization
Security Objectives semi-formal but unmorderated (for now) blog. Internet Explorer 3D Memory Visualization. September 19, 2007. I decided to play around with IE and see how well I could adapt WPF to a systems application. This was my first try, so it sort of looks like an alien toothbrush or something, but it get’s the idea across. I like some of these visualizations quite a bit;. Http:/ www.visualcomplexity.com/vc/project.cfm? I’ve got a reason for likening that one, more on that later. You are commenti...
shanemacaulay.wordpress.com
PostBluehat | security-objectives.com
https://shanemacaulay.wordpress.com/2007/10/05/postbluehat
Security Objectives semi-formal but unmorderated (for now) blog. October 5, 2007. The best laid plans of mice and men… How’s that go? Unfortunately, I fed the gremlins before midnight or something the day before my presentation and I was not able to show the epic WPF visualizations I had planned. Better late than never, here are 2 different perspectives of the native heap. Green is an allocated busy block, red is anything else right now. That’s it for now, more soon. Leave a Reply Cancel reply. You are c...
shanemacaulay.wordpress.com
With the Parents | security-objectives.com
https://shanemacaulay.wordpress.com/2007/09/18/hello-world/with-the-parents
Security Objectives semi-formal but unmorderated (for now) blog. Raquo; With the Parents. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. You are commenting using your Google account. ( Log Out. Notify me of new comments via email.
SOCIAL ENGAGEMENT