Everybody agree on the fact that security is a day to day fight. New security flaws are discovered everyday and keeping your devices (*) is really a pain. There is nothing more boring that patching a system! Secunia proposes a tool to help you to keep your computers up to
Category: Security
Storage Security: RAID vs Sync
Last week, one of my hard disks crashed. I maintain a file server @ home running OpenBSD with the raid(4) driver. This setup was done in Augustus 2007. The design is quite simple: 2 x 250 GB disk configured in RAID1. I already had a power outage two months ago
Responsible Behaviour
http://xkcd.com/364/Dies sind die Spieler, die sich um online zu kostenlose casinospiele Craps für Spaß, und sie wollen nicht viel Geld tun.
WordPress critical upgrade!
Happy New Year and happy patching! WordPress 2.3.2 is out!
Error Handling: verbosity−−;
Developers need to implement good error handling procedures in their code. There is nothing more annoying that something like “error 0x4e45ff“. On the other side, reporting too much details to the end user can lead to security threads! Use Google and search for “mysql error and look the cached pages.
Bluetooth .vs. Anonymity
bash.org is a wonderful archive of quotes found on IRC. Yesterday, I received the following quote from a colleague: <sixoo> Tain j’etais aux chiottes ce matin et bon nos bureaux c’est des toilettes collés les uns aux autres, bref… <sixoo> J’etais tranquillement en train de faire mon besoin et a
HoSProxy
When a security policy is in place, users will always try to bypass rules! When access to specific resources are denied, they will try to find alternative ways to access them (don’t ask why, it’s in the human behaviour!) Even worse with network resources! Some protocols might be denied by
Password weakness
Read this morning on DataNews: Dog names are the most common passwords used by people! Read the article. If you’re out of idea for your next password, try the Password Generator.
The end of PIN codes nightmare?
Everybody uses PIN code today. With your mobile, your credit card, your token. It’s a good security practice: A two-factors authentication with something you have (a token) and something you know (a PIN code). But the problem remains always the same: humans have difficulties to remember codes! GrIDsure worked on