Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.
  • Some of the criticism is valid. And, it has always been a double-edged sword of how do you trust someone who routinely violates trust. Every /. kiddie is going to be slapping his dick around on this one....brace yourselves.
    • He's got a pretty poor reputation, and deservedly at that. That said, the GOBBLES and phc people can be real assholes.
      • Yeah....the people I know don't think much of him either. Even the 2600 crowd aren't all that keen on him as I remember. Most people in this business can be real assholes :) It's worse than Hollywood.
        • And yet he's friendly, prompt, and write us a good book. Weird, huh?

          --Nat

          • We'll see. I'll probably pick this book up, like I pick up every other security book, but it looks like it will suffer from the same flaw too many other security books suffer from. Too much high level wanking, and not enough hacking. I'm open to being pleasantly surprised though.
            • I'll send you a copy, no need to take the risk. (email sent).

              So what security books would people want to see?

              --Nat

              • Thanks, already sent you a reply. I'd really like to see a good reverse engineering book with more of a pragmatic bent. If someone from LSD, teso, or ADM could be convinced to write it with real examples for a technical audience it would be killer. A good pragmatic book on code auditing would be nice as well. Something with plenty of real examples ideally written by someone who has published plenty of exploits (openbsd team would be nice, but unlikely). Other than that, someone should talk to shok at w00w00 about .net code auditing, someone should talk to Halvar about some of the cool reverse engineering tools and techniques he's been pioneering, and someone should make a deal with the guys over at MISC magazine, collect up their stuff and translate it into english, and publish it as a book (http://www.miscmag.com). but that's just off the top of my head ;)