hunting   2405

« earlier    

Gun Reform: Speaking Truth to Bullshit, Practicing Civility, and Effecting Change - Brené Brown
If alternatives exist outside of these forced choices (and they almost always do), then the statements are factually wrong. It’s turning an emotion-driven approach into weaponized belonging. And it always benefits the person throwing down the gauntlet and brandishing those forced, false choices.

The ability to think past either/or situations is the foundation of critical thinking, but still, it requires courage. Getting curious and asking questions happens outside our ideological bunkers. It feels easier and safer to pick a side. The argument is set up in a way that there’s only one real option. If we stay quiet we’re automatically demonized as “the other.”

The only true option is to refuse to accept the terms of the argument by challenging the framing of the debate. But make no mistake; this is opting for the wilderness. Why? Because the argument is set up to silence dissent and draw lines in the sand that squelch debate, discussion, and questions—the very processes that we know lead to effective problem solving.
....
In that moment I said the thing that I’ve felt my entire life but was either too afraid to say or didn’t have the words. I mustered up the most empathy I could and said, “I know that this is a hard and heartbreaking issue, but I don’t think you’re hearing me. I’m not going to participate in a debate where this issue is reduced to You either support guns or you don’t. It’s too important. If you want to have a longer conversation about it, I’m happy to do that. And I wouldn’t be surprised if the same issues piss us off and scare us.”
guns  NRA  hunting  solutions  truth  bullshit 
yesterday by Quercki
Needle in a Haystack
An amateur hunts 700-pound elk in the middle of a vast wilderness. How hard could it be?
longread  outdoors  hunting  animals  gearpatrol 
27 days ago by geglover
Enterprise Detection & Response: Hunting for Malware Critical Process Impersonation
Probably the most well-known algorithm for this is the Levenshtein distance. The resultant score is simply a count of the minimum number of single character insert, delete or modify operations it takes to convert str1 into str2. For example, the Levenshtein distance between 'svchost.exe' and 'scvhost.exe' (our example above) is 2 (delete the 'v', then add a new 'v' just after the 'c').
Because the algorithm is so simple, the Levenshtein distance would make a pretty decent choice for most uses, though in this case we're going to use a variant known as the Damerau-Levenshtein distance. The only difference here is that the Damerau-Levenshtein distance adds the transpose (switch adjacent characters) operation. Since transposition is one of the common techniques for creating confusingly similar filenames, it makes sense to account for this in our distance algorithm. With the Damerau-Levenshtein algorithm, the distance between 'svchost.exe' and 'scvhost.exe' is 1 (transpose the 'v' and the 'c').
With that background in mind, let's see how we can apply it across our network to detect malware masquerading as critical system processes.
hunting  cybersecurity  analysis 
4 weeks ago by bwiese
Defender Spotlight: David Bianco, Security Technologist, Sqrrl
I lead the Security Technologist group at a Cambridge, MA area startup called Sqrrl.  Our product, Sqrrl Enterprise, is an incident investigation and threat hunting solution that combines Big Data to consume and store all your logs, a graph database to help see how they all relate to each other, and automated and machine-assisted analytics to help discover and get to the bottom of security incidents much more quickly than you can with traditional investigation tools like SIEM or Splunk.
splunk  sqrrl  hunting  interview 
4 weeks ago by bwiese
What Do You Get When You Cross a Pyramid With A Chain? | Enterprise Detection & Response
Once you have your indicator data arranged by Kill Chain phase, you essentially have a dossier on how that threat acts as it tries to accomplish its missions.
Mark current detections and gaps in detection
Create a plan to close the gap
cybersecurity  ckc  ioc  hunting 
4 weeks ago by bwiese
Triage Any Alert With These Five Weird Questions! | Enterprise Detection & Response
The keys here are:

Providing the user with the context around the alert (what scenario is it intended to detect, what do actual examples of the TPs look like, etc)
Identifying what other information (stuff that's not already in the alert) the analyst needs to see, and providing quick easy access to this (e.g., pivot to examining the PCAP for an alert)
hunting  cybersecurity  analysis  context 
4 weeks ago by bwiese

« earlier    

related tags

(business  (industry)  (interest)  (quotation  (sport)  -  -tag  1  2010  2017  26th  480  accidental!pregnancy  africa  amp  analysis  angeles  animal  animal_rights  animals  animation  anthropology  antlers  apartment  art  attribute:  au  australi...  austrian  autism  autonomous  baby  badscience  bc  beach  beretta  biggame  bike  bikes  birds  birthday!sex  birthday  black  boat  books  bullshit  bully  bullying  camo  camoflauge  camping  carmillaxlaura  cars  casual  cat  catch  character:  chase  check  ckc  clay  cleaning  clothes  col...  coloradoparks&wildlife  community:  conservation  context  converted  cook  cooking  core  cosmos  cottage  coyote  cpw  crocodile  cybersecurity  cyprus  day  dean  debate  deep  deer  defense  derek/stiles  design  dfir  directory  discussions  dog  download  drawing  driving  drugs  duck  eagle  embassy  england  english  event  fandom:carmilla  fandom:supernatural  fandom:teenwolf  farm  fast  fastfood  fielddressing  firearms  fish  fishing  flamingos  fmx  food  for  fox  franzen  freelance  ft.  functional  funny  fusion  gearpatrol  go  great  greatbritain  guns  h...  h2h  hacking  hares  have  hd  hedge  hijack  hijacking  history  home  homosapiens  house  houses  how  hr  human  hunt  hunter  huntereducation  huntersafety  ifttt  ikb  image  in  incident  index  international  interview  investors  ioc  ir  it  italy  job  jobs  jonathan  july  kigwangalla  kink  kink:  kink:alpha!dean  kink:alpha/beta/omega  kink:bottom!sam  kink:coming-untouched  kink:domesticity  kink:groping  kink:heat  kink:knotting  kink:mating  kink:mpreg  kink:omega!sam  kink:schmoop  kink:self-lubrication  knotting  labor  land  layout  lead  leica  leicasportoptics  life  lion  list  log  logging  loliondo  longread  los  lotter  maasai  maghreb  malta  malware  manuscripts  maryland  mates  maturity  mcdonalds  medieval  meme  mens  monarchy  mongolia  monitoirng  motion  mpreg  mudcrabs  multiple  n  natural  nature  nepal  new  newborn  newzealand  nhst  nra  null  nyc  oman  operation)  outdoorlifestyle  outdoors  p  pairing:sam/dean  parts  pentesting  people  pictures  pistol  placement  plans  plot:  poaching  pocket  poland  policing  politics  post  powershell  premium  presentations  programming  quora  rabbits  rana  ranch  rant  rat  rating:pg-13  recipe  reproducibility  repurposed  response  reviews  rifles  rodent  rural  safari  safety  sam  samples  school  scotland  sea  search  security  self  sensor  serengeti  series  service  sfc  shark  shedhunting  shooting  short  shotgun  significance  small  solutions  speaker  splunk  sport  sports  sq.  sqrrl  statistics  stop  stopped  story  subject)  survival  swans  sweden  sweet  table!sex  tail  talks  tanzania  tarradarrabros  taxide  technology  terrier  texas  thailand  they  threat  tiny  to  tories-are-evil  tories-hate-animals  tourism  tradition  traffic  trafficking  travels  treestand  trophies  truth  utility  value  vehicles  venery  vest  video  videos  vintage  waterfowl  waterhole  weekend  weffles  wellington  werewolf!danny  what  wildlife  winchester  windows  with  wool  wordpress  words:6000-9000  words:60000-80000  work  worried!dean  worried!sammy  yorker  yum 

Copy this bookmark:



description:


tags: