Since the 6th of June, a great application is available (for free) in the AppStore. RSA released an iPhone version of its software token! I already spoke about strong authentication on this blog. To resume, strong authentication is achieved by mixing at least two different types of authentication methods from
Do You Trust Your Framework?
Frameworks are developer’s best friends. Frameworks are sets of libraries, scripts or piece of code reusable by developers. To make things more simple, why re-invent the wheel? There exist frameworks for all development platforms like .Net for Microsoft IIS or Zend for PHP. ZionSecurity, a Belgian security firm, released a
Where are My Processes?
This screen capture shows a ‘top’ running on a multi-CPU server (4 x quad-core)… Now, I can fully understand the real value of the hot key <1>(*) 🙂 (*) from the top man page: “Toggle_Single/Separate_Cpu_States On/Off – This command affects how the ’t’ command’s Cpu States portion is shown. Although
Facebook Cybersquatting Soon?
Will Facebook once again make a buzz? Saturday, June 13th starting at 06:01am, Facebook users will be able to choose a username to customize their profile URL. Something like http://www.facebook.com/username/. After DNS cybersquatting, will we see a new effect of Facebook cybersquatting? There is already a FAQ available about this
Unix OS Security Audit/Assurance Program
I’m just back from the last ISACA Belgian Chapter meeting. Topic of today was about the UNIX OS security audit process. A very large topic! The speaker was Sanjay Vaid. For years now, Linux is deployed in business environment. Linux systems can take several forms: applications servers (print, files, web,
Follow Several Security Threat Levels via Twitter
Twitter, the micro blogging platform, attracts a larger audience days after days. According to recent studies, lot of accounts stay un-updated for long periods of time. On the other side, there are more and more huge communities of active users who tweet on specific topics: The IT security is represented
Revamped!
As you probably see, the blog has been revamped today. I liked the old theme but the fixed width was really annoying. The new look is based on the Atahualpa theme. There are for sure some minor problems to fix in the CSS code but feel free to give your
Compromized Bagde? ;-)
I’m back from Maubeuge where was organized the “Salon Informatique“. I had some free time this weekend and decided to visit our south-neighbors to make some social networking. The event had several aspects: exhibitors active in the open source world (users groups, schools, associations and professionals), a LAN party and
PDFiD Integration with Nautilus
I’m a big fan of Didier Stevens’s tool called PDFiD. But, like a lot of IT people, I’m also a lazy guy: less manipulations required makes me more happy! My professional environment is mainly based on Linux/Gnome but I also use virtualized Windows XP instances. As everybody I’m manipulating a
Security Incidents Classification by TaoSecurity
Richard, the owner of TaoSecurity posted an interesting article about the classification of security incidents. The exercise was to translate security incidents into something easily rank-able like numbers and colors) to a security incident (read: oriented to management). (Link from picassa) Read the blog article here. Take time to read