and I do computer security stuff
Analysis of a malicious Word document
Malicious Microsoft Office documents are one of the most common infection vectors. Usually received via email, they are the first step to compromise a system. I wanted to showcase in this article how this is usually performed, and share my analysis methods with you. Initial assessment Context This file was detected as an attachment of numerous received emails. It was blocked by the email gateway. Its name was factuur.doc, which means “invoice”, a well known disguise for malware droppers....
A bespoke bash prompt
I tried to edit my bash prompt to fit my needs and provide a clean working environment. Here is what I gathered so far, picking ideas here and there for what I found useful. ...
Installing VirtualBox Guest Additions in a Linux VM
I wrote this small article as a quick reference because I always forget what the requirements are for the installation of VirtualBox’s Guest Additions under a Linux virtual machine. ...