Powered by
Blogger
.
Follow cktricky
Blog Archive
►
2020
(3)
►
May
(1)
►
April
(1)
►
March
(1)
►
2019
(24)
►
December
(1)
►
May
(2)
►
March
(3)
►
February
(7)
►
January
(11)
►
2018
(2)
►
November
(1)
►
February
(1)
►
2017
(16)
►
November
(1)
►
August
(2)
►
June
(5)
►
May
(1)
►
March
(1)
►
January
(6)
►
2016
(13)
►
December
(1)
►
November
(1)
►
August
(2)
►
June
(1)
►
May
(2)
►
March
(2)
►
February
(1)
►
January
(3)
►
2015
(31)
►
December
(2)
►
November
(2)
►
September
(3)
►
August
(1)
►
June
(1)
►
May
(3)
►
April
(2)
►
March
(6)
►
February
(6)
►
January
(5)
►
2014
(10)
►
December
(1)
►
October
(2)
►
June
(1)
►
May
(2)
►
March
(2)
►
February
(1)
►
January
(1)
►
2013
(21)
►
December
(3)
►
October
(2)
►
September
(3)
►
August
(1)
►
July
(2)
►
May
(2)
►
April
(3)
►
March
(3)
►
January
(2)
►
2012
(53)
►
December
(3)
►
November
(5)
►
October
(11)
►
September
(6)
►
August
(2)
►
June
(2)
►
May
(12)
►
April
(6)
►
March
(1)
►
February
(3)
►
January
(2)
►
2011
(50)
►
December
(5)
►
November
(8)
►
October
(3)
►
September
(3)
►
August
(1)
►
July
(3)
►
June
(5)
►
May
(8)
►
April
(3)
►
March
(4)
►
February
(3)
►
January
(4)
►
2010
(54)
►
December
(2)
►
November
(4)
►
October
(1)
►
September
(3)
►
August
(1)
►
July
(6)
►
June
(4)
►
May
(9)
►
April
(7)
►
March
(5)
►
February
(4)
►
January
(8)
▼
2009
(125)
►
December
(7)
►
November
(10)
►
October
(12)
►
September
(20)
►
August
(3)
►
July
(1)
►
June
(2)
►
May
(9)
►
April
(12)
►
March
(9)
►
February
(23)
▼
January
(17)
Fastflux makes for some cool graphs
More on too much automation
When automation is too much automation or where's ...
Serving Up Malware via Ad Networks
Winzip FileView ActiveX Exploit
Interview with an adware author
Open Letter from Geeks to Recruiters
Oracle Sid Enumeration Metasploit Auxiliary Module
More exploits pls.
More Oracle Pwnage...I Lost Count...New Version Mo...
Weak Password Brings 'Happiness' to Twitter Hacker
How to digitally sign...
UK to allow warrantless "remote searching"
MSF VBA payload Demo
Dissecting a Multistage Web Attack that uses IE7 0day
Googling Security: How Much Does Google Know About...
Happy New Year!
►
2008
(169)
►
December
(5)
►
November
(14)
►
October
(19)
►
September
(4)
►
August
(16)
►
July
(15)
►
June
(19)
►
May
(19)
►
April
(10)
►
March
(23)
►
February
(16)
►
January
(9)
►
2007
(73)
►
December
(14)
►
November
(6)
►
October
(7)
►
September
(9)
►
August
(7)
►
July
(14)
►
June
(5)
►
May
(11)
Follow carnal0wnage
Blogs
Lares Blog
Metasploit Blog
Room 362
Pentestify
SkullSecurity
Follow Attack Research
Links
Lares Consulting
Attack Research
Strategic Security
EthicalHacker.net
Metasploit
Thursday, January 1, 2009
Happy New Year!
If you're subscribed to the blog or just found yourself here by accident.
Happy New Year!
Here's to good things in '09.
Share Post
CG
1 comment:
Morgan Storey
said...
Happy new Year CarnalOwnage, thanks for the blog it has been a good read.
January 3, 2009 at 2:10 AM
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
1 comment:
Happy new Year CarnalOwnage, thanks for the blog it has been a good read.
Post a Comment