Tag Archives: IT Security

Passwords revisited

After having generated pre-shared secret keys for IPsec VPNs, as recommended by the NSA, I wondered how “secure” the keys themselves actually were. The NSA specifically mentions the use of “large, high entropy, pre-shared keys”. Quite some time ago I … Continue reading

Posted in Crypto, IT Security | Tagged , , , | Comments Off on Passwords revisited

When a firewall fails to defend a network…

While it is true that a firewall today still is an important piece of networking equipment to logically separate different networks, its functionality has shifted over the years from plain network filtering to application level protocol inspection and intrusion prevention … Continue reading

Posted in IT Security | Tagged , , , , , , | Comments Off on When a firewall fails to defend a network…

Using Elliptic Curve with an OpenSSL PKI

OpenSSL is a tool that can be used to setup a (simple) PKI, but in its most basic form a command line tool with an endless amount of options. I find myself searching for the correct syntax of OpenSSL to … Continue reading

Posted in Crypto, IT Security, Shell script | Tagged , , , , , , , , , , , , , , | Comments Off on Using Elliptic Curve with an OpenSSL PKI

Email and malware dissection, Part I

Phishing, Trojans, Worms and other malicious activity in email. These series of posts make quite a lengthy write-up on how to use Unix shell script and Perl to dissect large amounts of email all at once without disrespecting email privacy … Continue reading

Posted in email, FreeBSD, IT Security, Linux, Mac OS X, malware, Perl, Shell script | Tagged , , , , | Comments Off on Email and malware dissection, Part I

Tinkering with file encryption

Storing files overseas or “in the cloud” has become somewhat of an issue lately with spying activities of various nations. I think we’ve just seen the top of the iceberg, but at the same time I hope I’m wrong. In … Continue reading

Posted in Crypto, FreeBSD, IT Security, Mac OS X, Shell script | Tagged , , , , | Comments Off on Tinkering with file encryption

Encrypted FreeBSD USB boot disk

It appears that USB attached storage devices resemble what floppy disks were back in the nineties. Back then, transporting floppies from one computer to another was very common. Unintentionally spreading malware and losing disks also. The risk of spreading malware … Continue reading

Posted in Crypto, FreeBSD, IT Security | Tagged , , , | Comments Off on Encrypted FreeBSD USB boot disk

Booting FreeBSD from a USB disk

Open source software has found its way in every corner of the IT industry. Which is great, as it provides possibilities that were otherwise to expensive to pursue. In general, there is (at least) one down-side to using open source … Continue reading

Posted in FreeBSD | Tagged , , | Comments Off on Booting FreeBSD from a USB disk

Brute force attacks from A to Z – part II (last)

Passwords are a regrettable nuisance. Perhaps even one of the most dreaded inconveniences of computer security. This last part will contain some very basic examples that will demonstrate brute force attacks on passwords. The beauty of a brute force attack … Continue reading

Posted in IT Security | Tagged | Comments Off on Brute force attacks from A to Z – part II (last)

Brute force attacks from A to Z – part I

After reading and watching some very interesting views on the use of strong passwords, I must say that I don’t think we will ever be able to do without passwords. They’re here to stay. I’ll bet that the average person … Continue reading

Posted in IT Security | Tagged , | Comments Off on Brute force attacks from A to Z – part I

File integrity on Mac OS X

Recently the US-CERT released a documented titled “Security Recommendations to Prevent Cyber Intrusions“, which seems to add quite a few measurements to another US official document, but this time in more technical terms. I don’t live in the US, but … Continue reading

Posted in IT Security | Tagged , | Comments Off on File integrity on Mac OS X