I was talking with a colleague recently who was helping me translate a report generated from a diagnostic tool. He has extensive knowledge in this area and was able to help me find the root cause of the issue I was working through fairly quickly. After talking with him for a while, it turned out…
Author: Relaki
Netflix’s The Great Hack and GPT-2
“Big data [1] is everything.” Note: This article is in no way political or discusses anything related to Cambridge Analytica or Ethics, i’m only really interested in the technology and how it can be a double edged sword. Anyone who watched the documentary The Great Hack [2] on Netflix recently might now have a basic…
Python 3 – Defeat your Email Filter by Encoding Files in base64
I’m sure everyone has came across this problem at least once; you try to send a colleague or a friend a file over email, only for it to be stripped by the filter. What’s most annoying is that not all email clients tell you that this has happened. A while ago a colleague of mine…
How to tell who Leaks your Email Address
Before I describe a technique you can use to tell where your email addresses are being leaked from, let’s take a small step back and review a little about email spam in general first. Unsolicited email spam has been a problem since the SMTP (Simple Mail Transport Protocol) was originally defined. Thankfully, software like SpamAssassin…
Steam 0day Privilege Escalation Vulnerability
Update: Now Fixed Last Wednesday a security researcher named Vasily Kravets published an article [1] detailing a “feature” of the Steam Client Service that could be abused by other programs to escalate their own privileges to that of SYSTEM [2]. SYSTEM is not actually an account, but for the purpose of this post you can…