Tag: Theory


  • Introduction and Background This attack expands upon the excellent research documented by Elad Shamir in “Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory.” I’ll cover the key points below, but his article a great resource and primer for Kerberos and constrained delegation in AD. If you’re already familiar with the Kerberos fundamentals, […]

  • Jason Shaw, Editor-in-Chief of the Academy of Management Journal discusses the issue of HARKing (hypothesizing after the results are known). This presentation is recorded as part of the University of Florida Warrington College of Business’ Reliable Research in Business initiative. To watch more videos about reliable research practices, please sign up here: https://warrington.ufl.edu/reliable-research-in-business/best-practices-for-reliable-research/.

  • A sci-fi trilogy called The Three Body Problem included a powerful concept called Dark Forest Theory, which basically says it’s a bad idea for people who don’t know about their surroundings to make noise that might attract attention. Or, taken as a game theory strategy, it’s better to destroy other civilizations before they get the […]