What is fuzzing?

What is fuzzing?

What is fuzzing? Fuzz testing, or fuzzing, is a concept in computer security. Like the name suggests, it’s the practice of sending messed-up data to a system to see how it behaves. A good computer system should handle fuzzing gracefully. As you might guess, not all do.

When a computer receives data it doesn’t expect, it may malfunction in unpredictable ways. Fuzzing attempts to find those malfunctions.

Read more

Using a Sound Blaster 16 on a 286

Using a Sound Blaster 16 on a 286

I wanted to play 1990-era games on my 286 that don’t run right on my 486, but that meant I needed a sound card. Early PC sound cards are very expensive, so I wanted a cheaper alternative. Here’s how I got a Sound Blaster 16 to work on a 286.

Creative’s DOS drivers for the Sound Blaster 16 require a 386. But the hardware functions properly on earlier PCs, so you can use them on a 286 or even an XT-class PC with a third-party driver.

Read more

Investing in model trains: Good idea or bad?

Investing in model trains: Good idea or bad?

From time to time, I see the topic of investing in model trains, whether Lionel, Marklin, scale brass models, or any other niche come up. There was a time when people make a lot of money doing that. Sad to say, for the most part that window of opportunity is closed.

It’s certainly possible to make money at your hobby. But investing in collectibles tends to be fleeting, so it’s something you should approach with extreme caution.

Read more

Is Yoast SEO good?

Is Yoast SEO good?

Let’s talk blogging. Specifically, let’s talk SEO. Is Yoast SEO good? You’ll hear mixed opinions of that. So I’ll share my personal experience, as someone who blogged without it for a decade.

My best blog posts didn’t need Yoast SEO. But there’s no question the majority of my blog posts do better with it, and I’ve never seen one do worse.

Read more

Valid reasons for running unauthenticated vulnerability scans

Valid reasons for running unauthenticated vulnerability scans

Authenticated vulnerability scans are usually better than unauthenticated scans. But sometimes there are valid reasons for running unauthenticated vulnerability scans. Here are some reasons you might want to do that.

The main reason to run unauthenticated vulnerability scans is to limit the information you share with people outside your organization, such as auditors. But they are also helpful for preparing for penetration tests.

Read more

5.25 floppy drive maintenance

5.25 floppy drive maintenance

It’s been a long time since 5.25-inch floppy drives were mainstream. But a lot of them can still work today with a little bit of cleaning and lubrication. Here’s a quick guide to 5.25 floppy drive maintenance.

Cleaning the heads, then cleaning and lubricating the rails is usually all it takes to get a 5.25-inch drive working well. Using the right cleaner and lubricating sparingly is the key to doing more good than harm.

Read more

WordPress Appliance - Powered by TurnKey Linux