Decision Making Today

We have all been taught to draw a line down the middle of a paper and list the pros and cons. While it is a great starting point, the standard pro-con list fails to account for the actual weight and probability of those outcomes. Instead, try creating a : List your top 3 to 4 options.

The hardest part about growing as a decision-maker is that our brains are incredibly good at rewriting history. When things work out, we tell ourselves we knew it all along. When things fail, we blame bad luck.

Amazon founder Jeff Bezos popularized a brilliant mental model for decision-making by categorizing choices into two types: decision making

: Set a strict deadline or a "good enough" information threshold. Once you have acquired 70% of the information you think you need, it is time to make the call. 🚪 2. Use the "Two-Way Door" Rule

In a world filled with endless data, we often fall into the trap of believing that more information automatically leads to better decisions. This is a cognitive illusion known as . We have all been taught to draw a

: Before you stress over a choice, ask yourself: "Is this a one-way or a two-way door?" If it is a two-way door, stop overthinking, choose quickly, and adjust course later if needed. 📊 3. Ditch the Standard Pro-Con List

This forces your brain to look at the hard data rather than just counting the sheer number of bullet points on a page. 📓 4. Keep a "Decision Journal" The hardest part about growing as a decision-maker

Whether you are deciding to pivot your career, invest in a new project, or make a major personal move, the pressure to make the "perfect" choice can easily freeze you in your tracks.

11 comments

  1. Nice write up – where can I get the vulnerable app? I checked IOLO’s website and the exploitdb but I can’t find 5.0.0.136

  2. Hello.
    Thanks for this demonstration!

    I have a question. With this exploit, can we access to the winlogon.exe and open a handle for read and write memory?

    Kind regards,

  3. Why doesn’t it work with csrss.exe?

    pHandle = OpenProcess(PROCESS_VM_READ, 0, 428); //my csrss PID
    printf(“> pHandle: %d || %s\n”, pHandle, pHandle);
    i got: 0 || (null)

  4. The SeDebugPrivilege is already enabled in this exploit, what you can do it use a previous exploit of mine which uses shellcode being injected in the winlogon process.

  5. Thanks! I found with its hex byte ’03 60 22′ in IDA search and reached vulnerable function.

Leave a Reply

Your email address will not be published. Required fields are marked *