id,blogroll_id,tag 176,25,reverse engineering 177,25,vulnerability research 178,25,free software 179,25,Guile Scheme 180,25,exploit development 181,25,self-hosted 182,25,hacker culture 183,25,privacy 184,25,blogging 185,25,cybersecurity