Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • Some of the criticism is valid. And, it has always been a double-edged sword of how do you trust someone who routinely violates trust. Every /. kiddie is going to be slapping his dick around on this one....brace yourselves.
    • He's got a pretty poor reputation, and deservedly at that. That said, the GOBBLES and phc people can be real assholes.
      • Yeah....the people I know don't think much of him either. Even the 2600 crowd aren't all that keen on him as I remember. Most people in this business can be real assholes :) It's worse than Hollywood.
        • And yet he's friendly, prompt, and write us a good book. Weird, huh?


          • We'll see. I'll probably pick this book up, like I pick up every other security book, but it looks like it will suffer from the same flaw too many other security books suffer from. Too much high level wanking, and not enough hacking. I'm open to being pleasantly surprised though.
            • I'll send you a copy, no need to take the risk. (email sent).

              So what security books would people want to see?


              • I speak for a thousand silent brethren when I say High Volume Website Security Hacks! (I don't personally care, though.)

              • While to someone it may be kewl to read a book written by someone poking in from the outside, that is at worst pretty one-sided, and I think tells you little of what to do to harden your security. While it's often parroted that to catch a criminal you have to think like one to really get a balanced view you would need to have both sides covered. Those outside do what they do out of maliciouness/greed/boredom/intellectual challenge/fame in their own circles/financial gain, but those inside do have equally
              • Thanks, already sent you a reply. I'd really like to see a good reverse engineering book with more of a pragmatic bent. If someone from LSD, teso, or ADM could be convinced to write it with real examples for a technical audience it would be killer. A good pragmatic book on code auditing would be nice as well. Something with plenty of real examples ideally written by someone who has published plenty of exploits (openbsd team would be nice, but unlikely). Other than that, someone should talk to shok at w