You travel with your children from time to time? Prepare them to all the security checks performed at the airport! How? Here is a nice toy available at Amazon: an airport x-ray scanner! (Source: Korben’s blog)
Interesting article about traffic filtering based on countries: http://www.securityfocus.com/infocus/1900/4. (It’s based on Microsoft ISA server but can be easily extended to other platforms)
OpenBSD is my favorite OS and one more time, it makes the difference! The latest OpenBSD CVS version introduces the “SSH Fingerprint ASCII Visualization“. What does it mean? When you connect to remote host via SSH, your SSH client performs some checks on the server key. If it changed, you
After several issues (here or here), this blog finally moved to a new server and new location. The site should have a high availability and better response time now. Enjoy!
A few weeks ago, I wrote a post about packet capture anonymization. When you have to share traces with other parties, anonymization can be a requirement. A new tool is available: PktAnon.
The popular service Youtube is a wonderful tool to promote all kind of information. But some countries find this too dangerous for multiple reasons (mainly political and/or religious). Have a look at the map below. It represents a world map of countries were Youtube is/was blocked: I’m the owner a
One more time, a new round started today in Belgium between Flemish and Walloons… (I don’t want to start a new political debate here: I’m living in the “French” side of Belgium and working in the “Dutch” side without problems. I try to speak in Dutch and my colleagues understand
It’s almost done. To fight child pornography on the Internet, the French government has a project of law (article in French) to filter all websites giving access to child pornography. The list will be distributed to all French ISP’s and they will have to block access to those websites (on
“CAPTCHA” ? What’s this? Everybody already used CAPTCHA (or “Completely Automated Turing Test To Tell Computers and Humans Apart“). You know those pictures made of deformed letters that you need to understand and type in a specific field to perform some operations like creating some accounts, authenticating, etc. Almost all
Events centralization is a must-have in your security policy. Using a central place where reside your logs has many advantages: Reduction of the resources usage on the source device (disk almost) No need to take care of local logs: logs contain critical data and must be secured. In case of