(in)security

hak5 rubber ducky hid device payload attacks

Automated Keyboard Attacks

Published on April 7th, 2014 | by Kalen Wessel

Every time you plug a keyboard into your computer it is identified as a Human Interface Device. Input is taken from the device and then sent to the host. Now when you plug in a keyboard …... Read More


life

Convert Coffee Into Code

Converting Caffeine into Code

Published on January 28th, 2014 | by Kalen Wessel

There is no denying that if you’re working as a developer, systems admin, engineer, or in sales you need that omnipotent drug best known as caffeine. It doesn’t matter if you are a americano, espresso, or …... Read More


coding

mac-packaging-feature-img

Using pkgbuild and productbuild on OS X 10.7+

Published on January 3rd, 2014 | by Luke Queenan

I recently had to upgrade our build process on OS X from using the outdated Package Maker to pkgbuild and productbuild tools. My first stop when using any new tools on a unix platform is to …... Read More


life

uptime_one_year

uptime: 1 year, 3 users

Published on October 30th, 2013 | by Kalen Wessel

It’s hard to believe that CrushBeerCrushCode has been serving up webpages for just over a year now. Last October, Dan, Luke and myself were all finishing up our Bachelor degrees – running honeypots, analyzing packet captures, …... Read More


coding

c linked list algorithm problems

Copying Linked Lists with Random Pointers

Published on September 15th, 2013 | by Luke Queenan

The other day while burning a few minutes before a meeting, a colleague showed me the following problem: Copy a single linked list where each node has three pointers; data, next, and a random pointer to …... Read More


Back to Top ↑