Category Archives: IT Security

Buzzword bingo, or how to survive long meetings

Working in the IT industry can be very exiting. But not always. There is quite some communication involved when working in a team, and some of those meetings are filled with dull moments to get through, and I must admit … Continue reading

Posted in Web | Tagged , , , , , , , | Comments Off on Buzzword bingo, or how to survive long meetings

Encrypted FreeBSD USB boot disk

It appears that USB attached storage devices resemble what floppy disks were back in the nineties. Back then, transporting floppies from one computer to another was very common. Unintentionally spreading malware and losing disks also. The risk of spreading malware … Continue reading

Posted in Crypto, FreeBSD, IT Security | Tagged , , , | Comments Off on Encrypted FreeBSD USB boot disk

Memoirs of email

Email. Practically everyone connected to the Internet has at least one email address. Not surprisingly: If you get connected to the Internet, one of the first things to do is inform your friends and family on how to reach you… … Continue reading

Posted in email | Tagged , , , , | Comments Off on Memoirs of email

PFlogging 2.0

It’s no secret that I’m a big fan of computer systems that are running a Unix-like or Unix-derived operating system. There are quite a few around me right now, running FreeBSD, Linux-Mint and Mac OS X Lion. I have a … Continue reading

Posted in FreeBSD, IT Security | Tagged , , , , , | Comments Off on PFlogging 2.0

Brute force attacks from A to Z – part II (last)

Passwords are a regrettable nuisance. Perhaps even one of the most dreaded inconveniences of computer security. This last part will contain some very basic examples that will demonstrate brute force attacks on passwords. The beauty of a brute force attack … Continue reading

Posted in IT Security | Tagged | Comments Off on Brute force attacks from A to Z – part II (last)

Brute force attacks from A to Z – part I

After reading and watching some very interesting views on the use of strong passwords, I must say that I don’t think we will ever be able to do without passwords. They’re here to stay. I’ll bet that the average person … Continue reading

Posted in IT Security | Tagged , | Comments Off on Brute force attacks from A to Z – part I

File integrity on Mac OS X

Recently the US-CERT released a documented titled “Security Recommendations to Prevent Cyber Intrusions“, which seems to add quite a few measurements to another US official document, but this time in more technical terms. I don’t live in the US, but … Continue reading

Posted in IT Security | Tagged , | Comments Off on File integrity on Mac OS X

Attack from Nmap – The Nmap Scripting Engine

Scripting languages are great. There must be at least a few hundred or maybe even thousand of them. Most popular ones these days start with the letter P. Nmap supports scripts: The Nmap Scripting Engine. This has been around since … Continue reading

Posted in IT Security | Tagged | Comments Off on Attack from Nmap – The Nmap Scripting Engine