I am retiring this social media account. Find me as @hal_pomeranz@infosec.exchange

Orlando, FL
Joined November 2008
Filter
Exclude
Time range
-
Near
Replying to @MalwareJake
If an operation using these exploits was ever tumbled by an adversary, then they should have started the vendor notification process immediately. You must assume the exploit will be found and reverse-engineered.
2
Replying to @bettersafetynet
Excellent! You’re on!
1
This week you can do a bunch of awesome! I believe in you!
1
2
5
Another geometry blast from the past, Euler’s Formula for the relation of edges, vertices, and faces in a polyhedra: “V - E + F = 2” - elegant!
1
It’s because they are being so careful with your data
1
3
Replying to @iamevltwin
Just had a case head to settlement an I am relaxing with some Talisker Storm
1
Replying to @eric_conrad
That is awesome! I am jelly!
1
Having teenagers means relearning obscure geometry formulas long forgotten. Like the poetry of the "arc radius formula" -- R = H/2 + W^2/8H
5
You are better than you think you are. Half the battle is showing up and getting started.
1
Having a throw-down with @JBeanDesign regarding smart vs straight quotes. Just another typical Saturday morning.
1
4
Replying to @attrc
This was me about a decade ago. I couldn’t find any such companies. So I became a consultant and an incident responder. Sometimes you need to change horses.
4
It always comes down to Event Logs. Book it.
1
2
12
It's throwback Thursday and I'm banging the heck out of some images using the technique described here digital-forensics.sans.org/b…
1
Replying to @mrthaggar
Sent you another email--the explanation was too long for Twitter
2
Replying to @mrthaggar
There's only one chunk at the next level of the tree, so it has to be at logical offset zero from the start of the directory file.
1
Replying to @mrthaggar
My reply should have hit your inbox
1
“Should I make myself a target for international law enforcement?” That question sort of answers itself, doesn’t it?
This tweet is unavailable
1