A “Wall of Shame” or “Wall of Sheep” is a real-time demonstration application which searches for non secured (read: sent in clear text) login/passwords sent through a network. One of the well-know wall of sheep is the one operated every year during the Defcon conference in Las Vegas. A few
BruCON 2010 Wrap-Up
BruCON is already over! Two exciting days spent with most of the top security speakers coming from several continents. I usually write a quick review of the presentations I followed during a security conferences but BruCON is something different: I’m behind the stage. Like last year, I gave some of
SOURCE Barcelona Day #2 Wrap-Up
The second day of SOURCE Barcelona is already over. I’m at the airport waiting for my early flight and crossing my fingers due to the announced French air controllers strike. BruCON is now at our doors and we need to build everything tonight. What about the second day? Well, it
SOURCE Barcelona Day #1 Wrap-Up
This week promises to be a busy one. I woke up early to catch my plane to Barcelona! The flight was delayed due to a strike in France but I arrived not too late and just missed the keynote. Barcelona is a very beautiful city and the place where is
Is the SIEM Landscape Changing?
If you follow the IT news feeds, you probably learned today that HP bought ArcSight for $1.5 billions. ArcSight is not a known public name but is a leader on the SIEM (“Security Information & Event Management“) market. This announce already generated lot of comments, positive as negative. Log management,
SOURCE Barcelona is at our Doors!
In exactly one week, I’ll fly to Barcelona to attend the SOURCE Conference. Flight and hotels are booked for a while, it’s now time to prepare to cover the event. The schedule has been published for a while with a good balance between technical and business talks. Here is my
Book Review: IT Inventory and Resource Management With OCS Inventory NG 1.02
During my holidays, I finally took the time to finish to read the book “IT Inventory and Resources Management with OCS Inventory NV 1.02” which covers the application with the same name. Even if the inventory of devices connected to a network is primarily a system administration task, it has
Configuring Conditional SSH Connections
Years after years, OpenSSH became the default SSH daemon on most of UNIX environments as well as other systems. It offers a lot of features which make it terribly customizable and powerful. For a while, the ‘Match” keyword appeared in the list of directives. It allows conditional blocks of configuration
Smile, You Just Have Been Indexed!
I’m certainly not addicted to web stats. This blog has a Google Analytics marker but I don’t follow the statistics on a regular base. After all, I’m blogging for fun and I don’t need to keep my audience at a certain amount or don’t need to attract more visitors –
Back Online!
I’m back online after a few days off in France with my wife, kids and… less Internet connectivity (but never far from a WiFi hotspot to check urgent mails). Helas, everything has an end and I’m already back in Belgium… Step one, process the huge monstrous backlog of pending information: