Blog Archive 2019 What the hell? Same-operand comparisons on Intel architecture Oct 04 2019 Getting started with CTFs Sep 27 2019 2016 It’s all fun and games until someone loses a life Mar 19 2016 Network imagineering Mar 19 2016 hsleep: `sleep` with a countdown Mar 14 2016 I have a new home and new job! Mar 05 2016 2015 Briefly: Operator Requirements Nov 23 2015 Briefly: Health Checks Nov 08 2015 Briefly: Logs Oct 29 2015 I have a new job at Truss! Oct 01 2015 Personal Archery FAQ May 24 2015 What am I supposed to do with all of this honey?! Jan 04 2015 Give it a rest Jan 03 2015 2014 On Slack and Upkeep Aug 08 2014 2013 Troubleshooting ELBs with elbping Oct 19 2013 My DEF CON 21 Experience Aug 08 2013 Why I moved to San Francisco Jul 21 2013 My Personal Kaizen Jul 04 2013 Catching up Jun 22 2013 Intro to Operations: Metrics Collection May 07 2013 Intro to Operations: Availability Monitoring and Alerting May 05 2013 Intro to Operations: Configuration Management May 05 2013 Intro to Operations for Early Stage Startups May 04 2013 2012 Annual Review Jan 14 2013 2012 An early year-end review – highlights Dec 16 2012 Painless instrumentation of Celery tasks using statsd and graphite Mar 12 2012 We Have the Tools but What About the Techniques? Jan 02 2012 2011 Annual Review and New-Year Updates Jan 01 2012 2011 Concurrent Engineering: The Foundation of DevOps Dec 07 2011 Stop Letting Technical People Get Away With Social Ineptitude Aug 17 2011 Problems at Scale Aug 13 2011 Amazon’s Relational Database Service (RDS) – The Black Box From Hell Aug 10 2011 A Couple of Python Snippets Jun 30 2011 Common Single Point of Failure: People Jun 07 2011 Controlling Django Apps with an Init Script May 29 2011 Automating Webcam Snapshots and Uploads to Flickr Mar 26 2011 Correlating Last Login Dates with Signup Dates from a MMORPG Mar 24 2011 Screen-Scraping Search Results for Information Retrieval Mar 23 2011 Multiple Vulnerabilities in Mingle Forum (WordPress Plugin) Jan 08 2011 2010 Picking Applications to Audit Dec 23 2010 So You Just Received A Vulnerability Report. Now What? Dec 22 2010 Finding Web Vulnerabilities Dec 21 2010 Multiple Vulnerabilities in WP Forum (WordPress Plugin) Dec 17 2010 Cost Behavior Analysis Calculator Nov 08 2010 Twitter vs Erotica: Your Corpora’s Source Matters Oct 30 2010 WordPress Auto Upgrade and “Dumb” Permissions Oct 29 2010 RIP BookSuggest Oct 26 2010 Code Responsibly: What’s Best for Your Clients? Oct 23 2010 Validating Data with New-Style Classes in Python Oct 11 2010 The HN Effect in Numbers Aug 24 2010 How I Made Money Spamming Twitter with Contextual Book Suggestions Aug 13 2010 What are the Generally Accepted Accounting Principles (GAAP)? Jul 24 2010 Who was Enron and why is this important to financial reporting today? Jul 19 2010 Financial Crises: And the Cycle Continues Jul 19 2010 Why was the Sarbanes-Oxley Act of 2002 created and how does it impact financial reporting today? Jul 09 2010 Who Regulates Financial Reporting? Jul 02 2010 What is financial reporting and who uses financial reports? Jul 02 2010 What are some of the main financial documents used in financial reporting? Jul 02 2010 Series: Financial Reporting Jul 02 2010 Python: Starting Tornado Apps at Boot Using Upstart May 08 2010 Dropping Privileges in Python for Tornado Apps May 08 2010 Twitter BookSuggest Feb 08 2010 twitter-repeater source released Jan 07 2010 2009 Minesweeper hacking – Viewing process memory in Windows Dec 04 2009 Link Aggregation on Cisco Catalysts & Foundry switches Dec 04 2009 Link Aggregation on a RedHat (CentOS) server and a Cisco Catalyst switch Dec 04 2009 Hacking the Actiontec GT701 Wireless Gateway Dec 04 2009 Finding the Linux System Call table in 2.6 series kernels Dec 04 2009 EtherChannel trunking between a Foundry switch and Cisco Catalyst Dec 04 2009 Auto Type Juggling and Unsanitized Input Dec 04 2009
Why was the Sarbanes-Oxley Act of 2002 created and how does it impact financial reporting today? Jul 09 2010