<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Mike Gualtieri Homepage</title>
  <subtitle>Mike Gualtieri&apos;s posts on cybersecurity, Linux, Open Source Software, and electronics.</subtitle>
  <link href="https://www.mike-gualtieri.com/"/>
  <link href="https://www.mike-gualtieri.com/feed.xml" rel="self"/>
  <id>https://www.mike-gualtieri.com/</id>
  <author>
    <name>Mike Gualtieri</name>
  </author>
  <updated>2026-04-11T00:44:17.504Z</updated>

  
  <entry>
    <title>2022 Conference Talks</title>
    <link href="https://www.mike-gualtieri.com/posts/2022-conference-talks/"/>
    <id>https://www.mike-gualtieri.com/posts/2022-conference-talks/</id>
    <published>2023-01-06T00:00:00.000Z</published>
    <updated>2023-01-06T00:00:00.000Z</updated>
    <summary>In 2022 I was honored to present at the SANS Pen Test HackFest Summit.  Here is a recording shared of the event.</summary>
    <category term="security"/><category term="conference talk"/><category term="infosec"/><category term="cybersecurity"/><category term="purple team"/>
  </entry>
  <entry>
    <title>2021 Conference Talks</title>
    <link href="https://www.mike-gualtieri.com/posts/2021-conference-talks/"/>
    <id>https://www.mike-gualtieri.com/posts/2021-conference-talks/</id>
    <published>2022-01-04T00:00:00.000Z</published>
    <updated>2022-01-04T00:00:00.000Z</updated>
    <summary>I was fortunate to have been invited to present at two conferences in 2021!  Here are recordings shared online for each event.</summary>
    <category term="security"/><category term="conference talk"/><category term="infosec"/><category term="cybersecurity"/><category term="purple team"/><category term="offensivesecurity"/>
  </entry>
  <entry>
    <title>Purple Team Tactics: Simulating Supply Chain Attacks With DLL Hijacking</title>
    <link href="https://www.mike-gualtieri.com/posts/purple-team-tactics-simulating-supply-chain-attacks-with-dll-hijacking/"/>
    <id>https://www.mike-gualtieri.com/posts/purple-team-tactics-simulating-supply-chain-attacks-with-dll-hijacking/</id>
    <published>2021-05-25T00:00:00.000Z</published>
    <updated>2021-05-25T00:00:00.000Z</updated>
    <summary>This post details a method of creating a realistic synthetic supply chain attack, which can be conducted as part of a Purple Team exercise, using DLL hijacking to inject synthetic malware into an application.</summary>
    <category term="purple team"/><category term="adversarial emulation"/><category term="supply chain hack"/>
  </entry>
  <entry>
    <title>2020 Conference Talks</title>
    <link href="https://www.mike-gualtieri.com/posts/2020-conference-talks/"/>
    <id>https://www.mike-gualtieri.com/posts/2020-conference-talks/</id>
    <published>2021-05-22T00:00:00.000Z</published>
    <updated>2021-05-22T00:00:00.000Z</updated>
    <summary>I was fortunate to have been invited to present two conference talks in 2020, and even better each talk was recorded and shared online by the event! Here are the shared recordings.</summary>
    <category term="security"/><category term="infosec"/><category term="conference talk"/>
  </entry>
  <entry>
    <title>Live off the Land and Crack the NTLMSSP Protocol</title>
    <link href="https://www.mike-gualtieri.com/posts/live-off-the-land-and-crack-the-ntlmssp-protocol/"/>
    <id>https://www.mike-gualtieri.com/posts/live-off-the-land-and-crack-the-ntlmssp-protocol/</id>
    <published>2020-06-26T00:00:00.000Z</published>
    <updated>2020-06-26T00:00:00.000Z</updated>
    <summary>Live Off the Land in Windows and intercept NTLMv2 hashes!  A new tool NTLMRawUnHide is introduced to extract NTLMv2 hashes from raw packet traces, and we learn more about the NTLMSSP protocol.</summary>
    <category term="hacking"/><category term="security"/><category term="penetration testing"/><category term="tool"/><category term="NTLMv2"/><category term="NTLMSSP"/>
  </entry>
  <entry>
    <title>Red Team Tradecraft: Loading Encrypted C# Assemblies In Memory</title>
    <link href="https://www.mike-gualtieri.com/posts/red-team-tradecraft-loading-encrypted-c-sharp-assemblies-in-memory/"/>
    <id>https://www.mike-gualtieri.com/posts/red-team-tradecraft-loading-encrypted-c-sharp-assemblies-in-memory/</id>
    <published>2020-01-31T00:00:00.000Z</published>
    <updated>2020-01-31T00:00:00.000Z</updated>
    <summary>This post explores creating a simple C# dropper example that loads remotely hosted encrypted assemblies in memory.</summary>
    <category term="red team"/><category term="c sharp"/><category term="tradecraft"/>
  </entry>
  <entry>
    <title>Hooking Linux Libraries for Post-Exploitation Fun</title>
    <link href="https://www.mike-gualtieri.com/posts/hooking-linux-libraries-for-post-exploitation-fun/"/>
    <id>https://www.mike-gualtieri.com/posts/hooking-linux-libraries-for-post-exploitation-fun/</id>
    <published>2020-01-13T00:00:00.000Z</published>
    <updated>2020-01-13T00:00:00.000Z</updated>
    <summary>Explore Linux shared library hooking and process injection techniques using LD_PRELOAD to intercept passwords from htpasswd and PHP applications in memory.</summary>
    <category term="hacking"/><category term="security"/><category term="infosec"/><category term="linux"/><category term="red team"/>
  </entry>
  <entry>
    <title>Finding a Decade-Old Flaw in GNU Mailutils</title>
    <link href="https://www.mike-gualtieri.com/posts/finding-a-decade-old-flaw-in-gnu-mailutils/"/>
    <id>https://www.mike-gualtieri.com/posts/finding-a-decade-old-flaw-in-gnu-mailutils/</id>
    <published>2019-11-20T00:00:00.000Z</published>
    <updated>2019-11-20T00:00:00.000Z</updated>
    <summary>I recently discovered a Linux privilege escalation flaw dating back over 10 years in GNU Mailutils, a popular package self-described as </summary>
    <category term="security"/><category term="infosec"/><category term="vulnerability disclosure"/><category term="privilege escalation"/><category term="linux"/>
  </entry>
  <entry>
    <title>Modifying Empire to Evade Windows Defender</title>
    <link href="https://www.mike-gualtieri.com/posts/modifying-empire-to-evade-windows-defender/"/>
    <id>https://www.mike-gualtieri.com/posts/modifying-empire-to-evade-windows-defender/</id>
    <published>2019-02-26T00:00:00.000Z</published>
    <updated>2019-02-26T00:00:00.000Z</updated>
    <summary>By tearing into the Empire code base, we can easily modify some key areas and bypass that pesky client-side antivirus.</summary>
    <category term="security"/><category term="infosec"/><category term="empire"/><category term="antivirus"/><category term="evasion"/><category term="hacking"/>
  </entry>
  <entry>
    <title>Fax Vulnerability May Have Lasting Effects for Small Businesses</title>
    <link href="https://www.mike-gualtieri.com/posts/fax-vulnerability-may-have-lasting-effects-for-small-businesses/"/>
    <id>https://www.mike-gualtieri.com/posts/fax-vulnerability-may-have-lasting-effects-for-small-businesses/</id>
    <published>2018-08-17T00:00:00.000Z</published>
    <updated>2018-08-17T00:00:00.000Z</updated>
    <summary>Vulnerabilities in the fax protocol may rear it&apos;s ugly head for some time, especially for small-to-mid sized businesses; and especially for those that handle sensitive data.</summary>
    <category term="security"/><category term="small business"/><category term="fax machines"/>
  </entry>
  <entry>
    <title>Multiple Flaws Uncovered in Pydio 8</title>
    <link href="https://www.mike-gualtieri.com/posts/multiple-flaws-uncovered-in-pydio-8/"/>
    <id>https://www.mike-gualtieri.com/posts/multiple-flaws-uncovered-in-pydio-8/</id>
    <published>2018-07-23T00:00:00.000Z</published>
    <updated>2018-07-23T00:00:00.000Z</updated>
    <summary>Security research uncovering multiple vulnerabilities in Pydio 8, including XSS, SSRF, and Remote Code Execution flaws. CVE-2018-1999016, CVE-2018-1999017, CVE-2018-1999018.</summary>
    <category term="vulnerability disclosure"/><category term="pydio"/><category term="security"/><category term="web security"/>
  </entry>
  <entry>
    <title>S3 Buckets: Now With Both Leak &amp; Fill Vulnerability</title>
    <link href="https://www.mike-gualtieri.com/posts/s3-buckets-now-with-both-leak-and-fill-vulnerability/"/>
    <id>https://www.mike-gualtieri.com/posts/s3-buckets-now-with-both-leak-and-fill-vulnerability/</id>
    <published>2018-02-23T00:00:00.000Z</published>
    <updated>2018-02-23T00:00:00.000Z</updated>
    <summary>Earlier this week I had the privilege of providing insight for a Bleeping Computer article about the impending time-bomb that is world-writable Amazon S3 buckets.</summary>
    <category term="security"/><category term="s3"/><category term="ransomware"/><category term="cryptojacking"/>
  </entry>
  <entry>
    <title>Stealing Data With CSS: Attack and Defense</title>
    <link href="https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense/"/>
    <id>https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense/</id>
    <published>2018-02-06T00:00:00.000Z</published>
    <updated>2018-02-06T00:00:00.000Z</updated>
    <summary>A method is detailed, dubbed CSS Exfil, which can be used to steal targeted data using Cascading Style Sheets (CSS) as an attack vector.</summary>
    <category term="CSS Exfil"/><category term="exploit"/><category term="web security"/>
  </entry>
  <entry>
    <title>Model Radio Tower using 555 Timer and Lego Bricks</title>
    <link href="https://www.mike-gualtieri.com/posts/model-radio-tower-using-555-timer-and-lego-bricks/"/>
    <id>https://www.mike-gualtieri.com/posts/model-radio-tower-using-555-timer-and-lego-bricks/</id>
    <published>2017-12-21T00:00:00.000Z</published>
    <updated>2017-12-21T00:00:00.000Z</updated>
    <summary>Sometimes basic analog circuits are the best choice. This project uses a 555 timer to pulse lights on a model Lego radio antenna.</summary>
    <category term="electronics"/><category term="make"/><category term="555 timer"/><category term="lego"/><category term="radio"/><category term="antenna"/>
  </entry>
  <entry>
    <title>Move Over S3: Open Directory Indexes Continue to be a Problem</title>
    <link href="https://www.mike-gualtieri.com/posts/move-over-s3-open-directory-indexes-continue-to-be-a-problem/"/>
    <id>https://www.mike-gualtieri.com/posts/move-over-s3-open-directory-indexes-continue-to-be-a-problem/</id>
    <published>2017-12-12T00:00:00.000Z</published>
    <updated>2017-12-12T00:00:00.000Z</updated>
    <summary>Analysis of publicly accessible web server directories containing sensitive data, showing millions of exposed files indexed on Google beyond just S3 bucket misconfigurations.</summary>
    <category term="security"/><category term="infosec"/><category term="cybersecurity"/><category term="owasp"/><category term="remote vulnerability"/><category term="s3"/>
  </entry>
  <entry>
    <title>xterm can talk (001): Amazon Delivery</title>
    <link href="https://www.mike-gualtieri.com/posts/001-xterm-can-talk-amazon-delivery/"/>
    <id>https://www.mike-gualtieri.com/posts/001-xterm-can-talk-amazon-delivery/</id>
    <published>2017-11-30T00:00:00.000Z</published>
    <updated>2017-11-30T00:00:00.000Z</updated>
    <summary>A tech-themed cartoon exploring the humorous side of smart home technology and Amazon&apos;s delivery ecosystem.</summary>
    <category term="cartoon"/><category term="amazon"/><category term="echo"/>
  </entry>
  <entry>
    <title>Security Researchers Lose a Favorite DNS Recon Tool Jan 2018</title>
    <link href="https://www.mike-gualtieri.com/posts/security-researchers-lose-a-favorite-dns-recon-tool-jan-2018/"/>
    <id>https://www.mike-gualtieri.com/posts/security-researchers-lose-a-favorite-dns-recon-tool-jan-2018/</id>
    <published>2017-11-16T00:00:00.000Z</published>
    <updated>2017-11-16T00:00:00.000Z</updated>
    <summary>Scammers can now conceal their campaigns by utilizing a wildcard certificate, so the phishing sub-domain does not appear in the Certificate Transparency project.</summary>
    <category term="infosec"/><category term="cybersecurity"/><category term="certificate transparency"/><category term="letsencrypt"/><category term="phishing"/>
  </entry>
  <entry>
    <title>KRACK: How To Protect Yourself on a Flawed Network</title>
    <link href="https://www.mike-gualtieri.com/posts/krack-how-to-protect-yourself-on-a-flawed-network/"/>
    <id>https://www.mike-gualtieri.com/posts/krack-how-to-protect-yourself-on-a-flawed-network/</id>
    <published>2017-10-18T00:00:00.000Z</published>
    <updated>2017-10-18T00:00:00.000Z</updated>
    <summary>KRACK underscores an important lesson. You can&apos;t trust your network. As soon as a packet leaves your computer or smartphone, assume always that it&apos;s being sniffed and manipulated.</summary>
    <category term="security"/><category term="hacking"/><category term="krack"/><category term="wpa2"/>
  </entry>
  <entry>
    <title>iOS Credential Phishing &apos;Flaw&apos; Not Limited to Malicious Apps</title>
    <link href="https://www.mike-gualtieri.com/posts/ios-credential-phishing-flaw-not-limited-to-malicious-apps/"/>
    <id>https://www.mike-gualtieri.com/posts/ios-credential-phishing-flaw-not-limited-to-malicious-apps/</id>
    <published>2017-10-10T00:00:00.000Z</published>
    <updated>2017-10-10T00:00:00.000Z</updated>
    <summary>While this isn&apos;t necessarily a direct flaw within iOS, the attack vector is subtle and I bet would fool many people.</summary>
    <category term="security"/><category term="hacking"/><category term="phishing"/>
  </entry>
  <entry>
    <title>Equifax, SEC, &amp; Now Deloitte: Organizations Must Employ Offensive Security</title>
    <link href="https://www.mike-gualtieri.com/posts/equifax-sec-and-now-deloitte-organizations-must-employ-offensive-security/"/>
    <id>https://www.mike-gualtieri.com/posts/equifax-sec-and-now-deloitte-organizations-must-employ-offensive-security/</id>
    <published>2017-09-26T00:00:00.000Z</published>
    <updated>2017-09-26T00:00:00.000Z</updated>
    <summary>Offensive security is a school of thought, where a proactive approach is taken to computer security.  While defensive measures are essential, an offensive security approach focuses on penetration testing and thinking like an attacker, with a goal of finding weaknesses in your own organization&apos;s systems and software.</summary>
    <category term="security"/><category term="hacking"/><category term="infosec"/><category term="offensivesecurity"/>
  </entry>
  <entry>
    <title>Equifax Redux Part 1: Assume You Are Already Compromised</title>
    <link href="https://www.mike-gualtieri.com/posts/equifax-redux-part-one-assume-you-are-already-compromised/"/>
    <id>https://www.mike-gualtieri.com/posts/equifax-redux-part-one-assume-you-are-already-compromised/</id>
    <published>2017-09-21T00:00:00.000Z</published>
    <updated>2017-09-21T00:00:00.000Z</updated>
    <summary>I&apos;m not going to speculate why a software package went unpatched.  It should have been patched - and swiftly - but what if the flaw was a so-called 0-day exploit without a patch?  Would Equifax still be held liable for such a massive breach?  The answer should be a resounding yes!</summary>
    <category term="security"/><category term="hacking"/><category term="infosec"/>
  </entry>
  <entry>
    <title>Chaining Remote Web Vulnerabilities to Abuse Let&apos;s Encrypt</title>
    <link href="https://www.mike-gualtieri.com/posts/chaining-remote-web-vulnerabilities-to-abuse-lets-encrypt/"/>
    <id>https://www.mike-gualtieri.com/posts/chaining-remote-web-vulnerabilities-to-abuse-lets-encrypt/</id>
    <published>2017-08-31T00:00:00.000Z</published>
    <updated>2017-08-31T00:00:00.000Z</updated>
    <summary>Recently I started playing around with the ACME validation routine Let&apos;s Encrypt uses to verify domain ownership, suspecting that it may be abused to issue an SSL certificate to an attacker.</summary>
    <category term="security"/><category term="hacking"/><category term="remote vulnerability"/><category term="ssl"/><category term="letsencrypt"/>
  </entry>
  <entry>
    <title>Build a Raspberry Pi Powered Arcade Machine!</title>
    <link href="https://www.mike-gualtieri.com/posts/build-a-raspberry-pi-powered-arcade-machine/"/>
    <id>https://www.mike-gualtieri.com/posts/build-a-raspberry-pi-powered-arcade-machine/</id>
    <published>2014-02-13T00:00:00.000Z</published>
    <updated>2014-02-13T00:00:00.000Z</updated>
    <summary>Complete guide to building a retro arcade machine powered by Raspberry Pi with MAME, including hardware setup, GPIO controls, and custom software configuration.</summary>
    <category term="raspberry pi"/><category term="arcade"/><category term="make"/><category term="electronics"/>
  </entry>
  <entry>
    <title>Build an Arduino Word Clock</title>
    <link href="https://www.mike-gualtieri.com/posts/arduino-word-clock/"/>
    <id>https://www.mike-gualtieri.com/posts/arduino-word-clock/</id>
    <published>2013-12-24T00:00:00.000Z</published>
    <updated>2013-12-24T00:00:00.000Z</updated>
    <summary>Complete tutorial for building an Arduino word clock that displays time as sentences using LEDs, shift registers, and a real-time clock module.</summary>
    <category term="arduino"/><category term="electronics"/><category term="clock"/><category term="RTC"/><category term="shift registers"/>
  </entry>
  <entry>
    <title>Check Out My New Site: makeRF.com</title>
    <link href="https://www.mike-gualtieri.com/posts/new-website-makerf/"/>
    <id>https://www.mike-gualtieri.com/posts/new-website-makerf/</id>
    <published>2013-06-17T00:00:00.000Z</published>
    <updated>2013-06-17T00:00:00.000Z</updated>
    <summary>If you are interested in radio and hobby electronics be sure to check out my new website makeRF.com!</summary>
    <category term="amateur radio"/><category term="electronics"/><category term="make"/><category term="DIY"/><category term="makeRF"/>
  </entry>
  <entry>
    <title>Hacking My House #1.5: When Lightning Rings</title>
    <link href="https://www.mike-gualtieri.com/posts/hacking-my-house-1-5-when-lightning-rings/"/>
    <id>https://www.mike-gualtieri.com/posts/hacking-my-house-1-5-when-lightning-rings/</id>
    <published>2013-05-22T00:00:00.000Z</published>
    <updated>2013-05-22T00:00:00.000Z</updated>
    <summary>How I fixed my Arduino doorbell that randomly rang during thunderstorms by adding a simple filter circuit to eliminate electrical noise from lightning and appliances.</summary>
    <category term="arduino"/><category term="circuits"/><category term="electronics"/><category term="doorbell"/><category term="schematic"/><category term="filter"/>
  </entry>
  <entry>
    <title>Hacking My House #1: Building a Musical Arduino Doorbell</title>
    <link href="https://www.mike-gualtieri.com/posts/hacking-my-house-1-building-a-musical-arduino-doorbell/"/>
    <id>https://www.mike-gualtieri.com/posts/hacking-my-house-1-building-a-musical-arduino-doorbell/</id>
    <published>2013-03-27T00:00:00.000Z</published>
    <updated>2013-03-27T00:00:00.000Z</updated>
    <summary>Building a custom Arduino doorbell that plays music using PWM, featuring circuit schematics, code, and an LM386 amplifier to replace boring ding-dong chimes.</summary>
    <category term="arduino"/><category term="circuits"/><category term="electronics"/><category term="doorbell"/><category term="schematic"/><category term="lm386"/>
  </entry>
  <entry>
    <title>Moving Your Landline To Google Voice</title>
    <link href="https://www.mike-gualtieri.com/posts/moving-your-landline-to-google-voice/"/>
    <id>https://www.mike-gualtieri.com/posts/moving-your-landline-to-google-voice/</id>
    <published>2012-06-13T00:00:00.000Z</published>
    <updated>2012-06-13T00:00:00.000Z</updated>
    <summary>A step-by-step guide to porting your landline phone number to Google Voice using a prepaid cell phone as an intermediary.</summary>
    <category term="google voice"/><category term="land line"/><category term="number porting"/>
  </entry>
  <entry>
    <title>In Memoriam Steve Jobs</title>
    <link href="https://www.mike-gualtieri.com/posts/in-memoriam-steve-jobs/"/>
    <id>https://www.mike-gualtieri.com/posts/in-memoriam-steve-jobs/</id>
    <published>2011-10-05T00:00:00.000Z</published>
    <updated>2011-10-05T00:00:00.000Z</updated>
    <summary>Remembering Steve Jobs and his legacy of design excellence, including the story of how rounded corners made their way into software.</summary>
    <category term="Steve Jobs"/><category term="rounded corners"/>
  </entry>
  <entry>
    <title>Facebook Facial Recognition Tool Is Good For Online Privacy</title>
    <link href="https://www.mike-gualtieri.com/posts/facebook-facial-recognition-tool-is-good-for-online-privacy/"/>
    <id>https://www.mike-gualtieri.com/posts/facebook-facial-recognition-tool-is-good-for-online-privacy/</id>
    <published>2011-06-10T00:00:00.000Z</published>
    <updated>2011-06-10T00:00:00.000Z</updated>
    <summary>The scary part about Facebook is the part I&apos;m not in control of, my Facebook Friends.  Unfortunately, there is little I can do when friends share my personal information or pictures online.</summary>
    <category term="facebook"/><category term="privacy"/>
  </entry>
  <entry>
    <title>Android Could Overtake Windows in 2016</title>
    <link href="https://www.mike-gualtieri.com/posts/android-could-overtake-windows-in-2016/"/>
    <id>https://www.mike-gualtieri.com/posts/android-could-overtake-windows-in-2016/</id>
    <published>2011-02-03T00:00:00.000Z</published>
    <updated>2011-02-03T00:00:00.000Z</updated>
    <summary>This model looks a bit more realistic, with total smartphone and PC sales in 2016 looking reasonable.  2016 is also the year where Android could surpass the Windows PC.</summary>
    <category term="android"/><category term="windows"/><category term="linux"/><category term="mobile"/><category term="OS war"/><category term="smartphone"/><category term="tablets"/><category term="future"/>
  </entry>
  <entry>
    <title>The Path To Ubiquitous Desktop Linux: Kill the Desktop &amp; Resurrect It</title>
    <link href="https://www.mike-gualtieri.com/posts/the-path-to-ubiquitous-desktop-linux/"/>
    <id>https://www.mike-gualtieri.com/posts/the-path-to-ubiquitous-desktop-linux/</id>
    <published>2011-01-12T00:00:00.000Z</published>
    <updated>2011-01-12T00:00:00.000Z</updated>
    <summary>Envisioning a future where smartphones and tablets running Linux replace traditional desktop computers by interfacing with dumb terminals at work and home.</summary>
    <category term="linux"/><category term="desktop linux"/><category term="android"/><category term="tablets"/><category term="smartphone"/><category term="OS war"/><category term="future"/>
  </entry>
  <entry>
    <title>Oh, No, Papa Smurf!</title>
    <link href="https://www.mike-gualtieri.com/posts/oh-no-papa-smurf/"/>
    <id>https://www.mike-gualtieri.com/posts/oh-no-papa-smurf/</id>
    <published>2010-12-17T00:00:00.000Z</published>
    <updated>2010-12-17T00:00:00.000Z</updated>
    <summary> The problem with devices like the iPad is the same problem with the PC.  They aren&apos;t designed for children, which can lead to usage issues.</summary>
    <category term="iPad"/><category term="iPhone"/><category term="android"/><category term="kids"/><category term="UX"/><category term="parental controls"/><category term="tablets"/>
  </entry>
  <entry>
    <title>Microsoft&apos;s User Inexperience Team Strikes Again</title>
    <link href="https://www.mike-gualtieri.com/posts/windows-phone-7-terrible-ux/"/>
    <id>https://www.mike-gualtieri.com/posts/windows-phone-7-terrible-ux/</id>
    <published>2010-10-15T00:00:00.000Z</published>
    <updated>2010-10-15T00:00:00.000Z</updated>
    <summary>A critical look at Windows Phone 7&apos;s poor user experience design, including cut-off text, inefficient screen usage, and excessive swiping requirements.</summary>
    <category term="microsoft"/><category term="windows mobile"/><category term="windows phone 7"/><category term="UX"/>
  </entry>
  <entry>
    <title>An Open Marketplace Does Not Mean Open Source</title>
    <link href="https://www.mike-gualtieri.com/posts/open-marketplace-is-not-open-source/"/>
    <id>https://www.mike-gualtieri.com/posts/open-marketplace-is-not-open-source/</id>
    <published>2010-10-06T00:00:00.000Z</published>
    <updated>2010-10-06T00:00:00.000Z</updated>
    <summary>Clarifying the difference between Android&apos;s open marketplace and open source software, and why security concerns about Android stem from closed source apps, not the OS itself.</summary>
    <category term="android"/><category term="security"/><category term="open source software"/><category term="app store"/>
  </entry>
  <entry>
    <title>The Rockmite: A 40 meters CW QRP Rig (in an Altoids Tin)</title>
    <link href="https://www.mike-gualtieri.com/posts/rockmite-qrp-rig/"/>
    <id>https://www.mike-gualtieri.com/posts/rockmite-qrp-rig/</id>
    <published>2010-09-15T00:00:00.000Z</published>
    <updated>2010-09-15T00:00:00.000Z</updated>
    <summary>The Rockmite is a low power (QRP) shortwave transceiver (combination receiver and transmitter) that can send morse code (CW) on a variety of frequencies.</summary>
    <category term="ham radio"/><category term="shortwave radio"/><category term="amateur radio"/><category term="rockmite"/><category term="transceiver"/><category term="CW"/><category term="altoids"/><category term="electronics"/>
  </entry>
  <entry>
    <title>What the Lag YouTube?</title>
    <link href="https://www.mike-gualtieri.com/posts/what-the-lag-youtube/"/>
    <id>https://www.mike-gualtieri.com/posts/what-the-lag-youtube/</id>
    <published>2010-09-10T00:00:00.000Z</published>
    <updated>2010-09-10T00:00:00.000Z</updated>
    <summary>Am I the only person in the world who is unsatisfied with the major lag while playing YouTube video&apos;s this past week?</summary>
    <category term="youtube"/><category term="net neutrality"/><category term="lag"/>
  </entry>
  <entry>
    <title>Forget Rendering Engines, Browsers Need To Focus on Features and Usability!</title>
    <link href="https://www.mike-gualtieri.com/posts/browser-focus-on-usability/"/>
    <id>https://www.mike-gualtieri.com/posts/browser-focus-on-usability/</id>
    <published>2010-08-18T00:00:00.000Z</published>
    <updated>2010-08-18T00:00:00.000Z</updated>
    <summary>If browsers standardized on one rendering engine, engineers could pour their innovations into one experience that is fast and renders exactly the same on all screens.</summary>
    <category term="browsers"/><category term="chrome"/><category term="firefox"/><category term="mozilla"/><category term="webkit"/><category term="gecko"/><category term="rendering engines"/>
  </entry>
  <entry>
    <title>Android, iPhone, and Open Source Code Review</title>
    <link href="https://www.mike-gualtieri.com/posts/android-iphone-oss-code-review/"/>
    <id>https://www.mike-gualtieri.com/posts/android-iphone-oss-code-review/</id>
    <published>2010-08-11T00:00:00.000Z</published>
    <updated>2010-08-11T00:00:00.000Z</updated>
    <summary> Android, iPhone, and Open Source Code Review - Summer is the season for security conferences, and one hot topic making news is the (in)security of smartphones.</summary>
    <category term="android"/><category term="iPhone"/><category term="security"/><category term="open source software"/><category term="trojans"/><category term="smartphone"/>
  </entry>
  <entry>
    <title>FVWM Config</title>
    <link href="https://www.mike-gualtieri.com/posts/fvwm/"/>
    <id>https://www.mike-gualtieri.com/posts/fvwm/</id>
    <published>2010-08-07T00:00:00.000Z</published>
    <updated>2010-08-07T00:00:00.000Z</updated>
    <summary>A highly customizable FVWM window manager configuration for Linux, built for power users seeking ultimate desktop configurability.</summary>
    <category term="fvwm"/><category term="linux"/><category term="desktop"/>
  </entry>
  <entry>
    <title>Linux Desktop Evolution</title>
    <link href="https://www.mike-gualtieri.com/posts/linux-screenshots/"/>
    <id>https://www.mike-gualtieri.com/posts/linux-screenshots/</id>
    <published>2010-08-07T00:00:00.000Z</published>
    <updated>2010-08-07T00:00:00.000Z</updated>
    <summary>A visual journey through the evolution of Linux desktop environments from KDE in 2001 to modern configurations, showcasing the customization possibilities.</summary>
    <category term="Linux"/><category term="desktop"/><category term="screenshots"/>
  </entry>
  <entry>
    <title>Kiddix - The Operating System for Kids!</title>
    <link href="https://www.mike-gualtieri.com/posts/kiddix/"/>
    <id>https://www.mike-gualtieri.com/posts/kiddix/</id>
    <published>2010-08-07T00:00:00.000Z</published>
    <updated>2010-08-07T00:00:00.000Z</updated>
    <summary>A family-friendly Linux-based operating system designed specifically for children, providing a safe, friendly, and fun computing environment.</summary>
    <category term="Kiddix"/><category term="Linux"/><category term="kids"/>
  </entry>
  <entry>
    <title>Split Splat - An iPhone Game</title>
    <link href="https://www.mike-gualtieri.com/posts/splitsplat/"/>
    <id>https://www.mike-gualtieri.com/posts/splitsplat/</id>
    <published>2010-08-07T00:00:00.000Z</published>
    <updated>2010-08-07T00:00:00.000Z</updated>
    <summary>An iPhone game developed in 2009 featuring a pigeon controlled by accelerometer, created during the iPhone app gold rush era.</summary>
    <category term="Split Splat"/><category term="iPhone"/><category term="game"/>
  </entry>
  <entry>
    <title>Welcome To My Updated Homepage!</title>
    <link href="https://www.mike-gualtieri.com/posts/welcome-to-my-updated-homepage/"/>
    <id>https://www.mike-gualtieri.com/posts/welcome-to-my-updated-homepage/</id>
    <published>2010-08-06T00:00:00.000Z</published>
    <updated>2010-08-06T00:00:00.000Z</updated>
    <summary>Mike Gualtieri: Homepage - Welcome To My Updated Homepage! I finally found some time to redesign my personal homepage, which has been in desperate need of an update.</summary>
    <category term="mike gualtieri"/><category term="homepage"/>
  </entry>
</feed>