Resizing Xen guest parition based filesystems
Creating Debian guests on Xen using parition based filesystem
Installing Xen on CentOS 6 from source
Creating VMware VMDK files from DD images using Live View
Setting up maildrop with Courier MTA
God Mode - Give Windows users an easier way to destory their computers
Installing Sun Java on Debian Lenny
Mounting drives/volumes read-only in Microsoft Windows (Vista)
Converting Microsoft OS to VMWare Guest
Converting Microsoft Vista from one version to another
Disable fast user switching on Vista
Kicking a user off a linux system
Authenicating kerberos against active directory
Configuring sendmail to accept mail
Edit group policy on remote computer
How-to setup an Upside-Down-Ternet
Setting Google Storage object ACL for authenticated downloads
Pseudo Gmail address obfuscation
Trouble accessing Gmail or internal chat client
Facebook gets linked account support
Domain registrars spamming sub-domains?
Network Traffic Capture in Virtual Enviroments
Detecting Tor traffic with Bro network traffic analyzer
Online Information Security Analysis Tools and Resources
Building Apache and ModSecurity from source
Detecting Tor network traffic with YaF and Python
Detecting Tor network traffic with SiLK
Passive DNS collection and analysis using YaF and Mediator
Decoding XOR payload using first few bytes as key
Block Command and Control requests using ASA 5500
Amazon S3 Server-Side Encryption using GSUtil
Block IRC and other communications with McAfee VirusScan
Variance in rwfilter results from netflow v5 and YaF
Configure YAF on Linux for NetFlow collection from a network tap or SPAN
Configure SiLK on Linux for NetFlow collection from a Cisco router
Running NIX Retina and Nessus vulnerability scans with least privileges
Blocking evil with the Enhanced Mitigation Experience Toolkit EMET
Insecure Library Loading Could Allow Remote Code Execution
Keeping your hardware safe and avoiding the evil maid
A few tools that may help rid of malware
Using metasploit to pwn MS06-067
Erase slack space on Microsoft Vista
Encrypting a secondary drive (PGP or TrueCrypt)
SQL injection attack on a PostgreSQL database (t_jiaozhu)
Running UAC and some other tricks to keep your computer running smoothly
Using Common Sense to Secure your Information