I want to take the opportunity and share an interesting IT security blog with you: “Ack Ack – Go beyond the impossible!“.
Four authors write very interesting blog posts, do some vulnerability research and publish tools && exploits. I especially love the article about performing DNS queries through MySQL (theory), the very funny RAM exhaustion when calling infinite mail client processes and the discovered overflow vulnerabilities in various mobile devices.
Normally I am not really a fan of such obvious advertisement posts, but well, this blog is really worth visiting. Guys, keep up the interesting work!