Irrelevant Hacks

Irrelevant musings of a hack blogger


Leave a comment

Security work. Remote, Hybrid or On-Site?

For the past year or so there have been a good number of news articles covering how remote work is dead, or that companies are pushing return to office policies that at times are pretty draconian. It’s understandable in part since many companies either started to build, or built huge new headquarters across the United States, which were sitting empty. Add in long term leases for other offices that they could not break. So you got the perfect storm of happy employees working from home, often proving to be just as productive, if not more so than in the office. And companies bleeding money on real estate that was sitting vacant. How about with Cybersecurity teams?

Continue reading


1 Comment

DevOps – The Four Types of Work – Part 2

So after my initial post, I decided to dig a bit deeper into the processes of DevOps, rather than go directly into the tools used (Docker, Kubernetes, Jira, etc.). I’m doing this mainly because the general view of many people in IT that DevOps is more about the tools used, rather than the actual processes that are needed to achieve success with DevOps.

Continue reading


Leave a comment

Peeple, the review site you never knew existed, but that you’re on because someone else signed you up for it

So, another day, another App or Startup.

This time it’s Peeple, a service like Yelp, but for reviewing actual people! So, it’s like a site that manages a database of information of different people and their reputations. All comments are NOT anonymous, and if any negative comment violates the rules, it might be removed. All relatively nice and interesting, but there’s a catch. And it’s a big one.

peeple1

peeple2

Or, you don’t even have to sign up for it to be on it. And no, the text message is to confirm that your profile has been added to the site, and NOT to ask your permission to BE added.

Continue reading


Leave a comment

The Sony Hack and Bandwidth

Ever since the GOP (Guardians of Peace) released corporate emails and data from Sony, there’s been huge amounts of speculation. Both by media and by security professionals alike. To sum it up, there are two lines of thought that have come up:

  1. North Korea is behind this (Media & FBI)
  2. It’s an inside job (IT Security experts)

But one thing has been on my mind, if it’s true that the GOP really has 100 Terabytes of files from Sony, how long would it take them to actually get it from Sony via the Internet?
Continue reading