Troublesome: HostGator and Microsoft

Troublesome: HostGator and Microsoft


This article is to inform you of the incompatibility that exists between HostGator and Microsoft hosted email services, Microsoft’s inability to accurately distinguish good email from spam, and how unhelpful they both have been in resolving the issue. I hope this article will help inform two groups of people: (1) those currently using/those considering using any Microsoft hosted or managed email service (ex. hotmail.com, live.com, msn.com, outlook.com, O365, etc.), and (2) those those currently using/those considering using HostGator’s hosting services.

(more…)

Burp+SSLintercept with Kali+Docker+Java+Python+Browser

Burp+SSLintercept with Kali+Docker+Java+Python+Browser


I couldn’t find a single source for setting this up, so I thought I would copy/paste my notes for others to reference. Feedback appreciated.

The goal is to proxy all http-80 and https-443 traffic in a docker/OS stack through Burp with (trusted) SSL intercept.

(more…)

Create a macOS High Sierra VM

Create a macOS High Sierra VM


After struggling for many hours to get macOS (High Sierra) running in a VM (Virtualbox) on a Linux host (Ubuntu/Mint), I finally succeeded.  Although there were dozens of really good tutorials on the topic, none of them were a 100% solution to my specific situation. Here’s what I did to get it working.

(more…)

Sex Objects

Sex Objects


Is it acceptable for a male to walk up to a female coworker and say, “You’ve got a booty like a Cadillac”? What about singing, to the same co-worker, “Come to the back seat of my car and I’ll let you have it”? I think most would agree these would not be acceptable. How is it, then, that playing songs with these lyrics is allowed in the workplace?

(more…)

Hacker’s Ethics – My Changing Perspective

Hacker’s Ethics – My Changing Perspective


Personal Ethics is not something that changes too dramatically over time. The foundation of our ethics is typically laid as children with small changes throughout our life. Untypical, then, was a major shift in my personal ethics as it relates to “security research”, aka hacking.

(more…)


© PEN Consultants, LLC 2013 -