Trump Twitter Bot

What I just made a thing on Twitter. It is a "bot". This python computer program runs on my computer and retweets Donald Trump's (https://twitter.com/realDonaldTrump) Twitter account only if the original tweet came from an Android device. Here's what it looks like for both a tweet from Trump and one that is probably not: Why... Continue Reading →

Changing your location manually in Chrome and Firefox

Our modern web browsers such as Google Chrome and Mozilla Firefox¬†(as well as Internet Explorer, Opera and Safari) have the abilities to use our current location using a variety of techniques. Most of the time, the browser will prompt the user and ask for permission to use the current location on some web site. That... Continue Reading →

[Bookmarked] Social Media Explained

Sometimes I find funny things in Twitter (https://twitter.com/monadarling/status/494932964669538304). I'm going to write some blog posts with these items so that I can remember where I found them and share them with others. Social Media Explained Social media, in all its varieties, can be daunting to understand much less participate in. This pic from (((DawntJalluss)) on... Continue Reading →

[Bookmarked] Pizza As A Service

Sometimes I find funny things in Twitter (https://twitter.com/RichGx/status/494572357898756096). I'm going to write some blog posts with these items so that I can remember where I found them and share them with others. Pizza As A Service Seems like more and more services are being offered as a service in the cloud. Sometimes people have trouble... Continue Reading →

Mutillidae Session Hijacking Lab

Overview This is a list of steps to perform to perform a web application session hijacking attack against a logged-in user of a web app. It uses the wonderful Mutillidae (https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project) vulnerable web application for the victim server, Burp Suite (free or pro, https://portswigger.net/burp/download.html) and a web browser (in this case, I've chosen Firefox). Steps... Continue Reading →

Fake Name Generator

When performing testing activities, whether it is web application penetration or usability testing, it is helpful to have example content to submit in web form fields. The same can be said for people trying to create sock-puppet or alias accounts on the Internet. We need to have sample/fake information so that we can set up... Continue Reading →

A WordPress.com Website.

Up ↑

%d bloggers like this: