digital forensics | incident response

The Cuckoo's Egg: Redux

 theory, books

So many people recommend 'The Cuckoo's Egg' as a must-read for information security professionals. For those in the dark, the book follows the author Cliff Stoll tracking unauthorised access to

Dude! Where's my HTTP/2?

 chrome, http/2

HTTP/2 is fundamentally different from HTTP/1.x; but it is not some edge-case of internet traffic. Figures that I found from April 2016 indicated it was 68% of