-
as seen on Server Fault
- Search for 'Server Fault'
I was thinking initially needing to do a reverse proxy or something so I could get some SSL/TLS traffic look like it is being terminated at a server and IP address in the AWS cloud, and then that traffic is forwarded onto our actual web servers that aren't in the cloud...
I've not done much iptables…
>>> More
-
as seen on Server Fault
- Search for 'Server Fault'
I have to make decision whether my Reverse DNS should match SMTP banner but Reverse DNS to DNS and vice versa stays different or vice versa. Which one to choose?
I have an 2x Exchange 2010 server with one SMTP Sender with TMG 2010. TMG has 2 links connected so that we have 2 separate internet providers…
>>> More
-
as seen on Stack Overflow
- Search for 'Stack Overflow'
I have a good many class based views that use reverse(name, args) to find urls and pass this to templates. However, the problem is class based views must be instantiated before urlpatterns can be defined. This means the class is instantiated while urlpatterns is empty leading to reverse throwing errors…
>>> More
-
as seen on Programmers
- Search for 'Programmers'
Lately I have been thinking of application security and binaries and decompilers. (FYI- Decompilers is just an anti-complier, the purpose is to get the source back from the binary)
Is there such thing as "Perfect Decompiler"? or are binaries safe from reverse engineering? (For clarity sake, by "Perfect"…
>>> More
-
as seen on Programmers
- Search for 'Programmers'
I bumped into an old friend at a conference and he told me he was now a consultant doing reverse engineering. I don't have much knowledge of this particular area, but this person (that I can't manage to get in touch with now) just casually mentioned that he was earning big bucks. I was hoping someone…
>>> More