Neutralize Shellshock by patching Bash with Perl
Unsupported Linux version? Upgrade Bash now
Read it
Perl web application security - HTTP headers
Instantly upgrade your web application security with these headers
Read it
Wear the cloak of invisibility with OpenVPN and Perl
How to covertly screen-scrape behind an encrypted connection and masked identity
Read it
Elements of Access Control
Why Gates? In a perfect world we wouldn’t do things we should not. However the world is not like this; people do forbidden things sometimes. This also applies to computer systems used by more than one person. Almost everyone…
Read it
Hacking Perl in Nightclubs
I’ve found the experiences of dancing and programming to have a great deal in common. With both I am immersed in an abstract world of animated structures, building up and breaking down many times before finally reaching a conclusion….
Read it
Preventing Cross-site Scripting Attacks
Introduction The cross-site scripting attack is one of the most common, yet overlooked, security problems facing web developers today. A web site is vulnerable if it displays user-submitted content without checking for malicious script tags. Luckily, Perl and mod_perl…
Read it
Asymmetric Cryptography in Perl
Introduction Symmetric cryptography allows Alice to exchange secret messages with Bob over the network, but only after they have shared a secret key. If Alice and Bob don’t live within commutable distance, or are unable to meet in person…
Read it
Mail Filtering with Mail::Audit
Let’s face it. procmail is horrid. But for most of us, it’s the only sensible way to handle mail filtering. I used to tolerate procmail, with its grotesque syntax and its less-than-helpful error messages, because it was the only…
Read it
Symmetric Cryptography in Perl
Having purchased the $250 cookie recipe from Neiman-Marcus, Alice wants to send it to Bob, but keep it away from Eve, who snoops on everyone’s network traffic from the cubicle down the hall. How can Perl help her? Ciphers…
Read it
Y2K Compliance
Lawyers, Liars, and Perl As the clock draws us relentlessly closer toward 2000, the final year of the second millennium, doom sayers everywhere are prophesying unprecedented computer failure in every conceivable sector. Known popularly as the Year 2000 Problem,…