An illustrated guide to the Kaminsky DNS vulnerability (2008)

How to read C type declarations (2003)

So you want to be a consultant?

Chroot – Best practices (2002)

SQL Injection Attacks by Example (2005)