A great blog post about detecting and working with asymmetrical latency in networks.
What do you do after you buy three shopping bags worth of Fiber Channel cards on eBay? This is a delightful story of the rabbit hole Ben went down to make the cards useful, including writing a virtual device handler that treats the cards like SCIS scanners!
The maximum size of an ethernet payload is 1500 bytes. This post explains the history of where that number came from.
A simple, modern and secure encryption tool with small explicit keys, no config options, and UNIX-style composability.
A blog post about reverse engineering a no longer supported VGA capture device to make it run on newer versions of Linux.
A game where you have to remember command line flags for cURL under pressure. It comes with a blog post explaining how it was built.
Ben figured out how to run arbitrary code on an inexpensive Dell switch.
Age is a replacement for GPG's file encryption features that will be easier to use without making mistakes.
An analysis of Border Gateway Protocol propagation and drift.
Ben sent 3.7 billion packets to effectively all of the reachable internet, and then visualized the results.