Writing
It’s Hammertime: SQL Injection For Beginners
Oh hey! I presented at the Australian Information Security Association (AISA) Conference in 2019 with a presentation called SQL Injection for Beginners: It's Hammertime. Peeps asked for the slides so here they are as a YouTube experience with all the vids and giph's...
Burp: A Quick Installation Guide
In order to execute a SQL injection, for example, we need to see what’s going on in the code behind the interface when we enter our username and password and send it over the internet or from the login page to the database. To do that we need to use...
W0m3nWh0HackM3lb0urn3: Monthly Ethical Hacking Sessions
W0m3nWh0HackM3lb0urn3 is a safe space for women who are keen to learn to ethically hack. We are a community of women identified hackers who support each other to increase our skills and hack all the (legal) things. Why? There’s a worldwide shortage of skilled cyber...
Penetrating Real-Time Threat Behaviour: Cyber Analytics and the Pen Tester
It’s the wild, wild, west out there in cyberspace, except the feral camels[1] that once roamed Texas are the hackers, and they’re roaming beyond borders and through firewalls on the daily. At present, cyber threat intelligence gathering is a mish-mash of intrusion...
Kneel
I’ve knelt down and opened my mouth to check the heart beat of many women it lives there louder than the organ that sustains us but only this time have I opened my heart wider than my legs and said I love you for the way you make my eyes widen before our lips...
The era of Lesbian Bed Death is over, long live Lesbian Fuck Eye
Sex is an art. And one that lesbians in particular have apparently, according to myth, taken a few decades to get their heads and legs around. Let alone actually in their beds. Today however, lesbian women have more orgasms, better sex and sex that lasts longer than...
WTAF is IoT?
From space, to transport, to the design of cities, IoT is the latest acronym to sweep the cyber landscape. IoT is short for Internet of Things and was coined by Kevin Ashton in 1999. IoT is any device, be it your phone, laptop or Raspberry Pi that is connected to the...
Searching Twitter Data with R and Grep
Learning how to use R Studio, R and then all the libraries and functions inside it can be hell(ish). But there's good little ways to search your Twitter data for whatever you're looking for, and give you some instant satisfaction in the process. Step 1 You will need...
Lesbian Desire Across The Ages: From Insane To Cult Hero
Cast your mind across everything you know about lesbians in history. In particular, Australian history. You might be able to name one or two lesbians, bisexuals or queer women from the 1900s, if you’re in the know. Otherwise, it’s a pretty bleak and sparse canvas,...
Gender Inequality in the IT Sector and Why it’s Bad for Business and Society
This piece focuses on diversity from a gender perspective. It recognises that the term diversity encompasses many more social categories than gender, such as, race, nationality and sexuality. However, the piece limits its discussion to gender, and specifically, to...
Mad, criminal or straight: Female desire in film and TV
When it comes to representations of lesbians in film and television, sometimes they're there, mostly they’re not. And if they are, they're mostly confined to cells. The lesbian in popular culture is usually mad, criminal or she’s really, actually, heterosexual....
Online harassment of LGBTI people: A Crime by Any Other Name
Policymakers need to commit funding to studying online harassment of LGBTI people and how to respond to it. The Internet was once considered the domain of the unreal, a kind of pseudo-utopia where anything goes and anything can be said or posted, at least for...