Recently, I read a RFP issued by a customer. The main topic focused on a perimeter security but a paragraph mentioned the protection of SCADA environments. I’ve no practical experience with SCADA and I tried to find relevant information about the deployment of security solutions in such environments. Here follows
Ubuntu Will Introduce the “Social” Desktop?
Some news have been disclosed about the next release of Ubuntu called “Lucid Lynx“. This new distribution is logically planned for April 2010 and will introduce, amongst a long list of new features, the “desktop socialization”. Mark Shuttleworth, the founder of Ubuntu, explained in an interview that the desktop will
Applications White List by ISC/NIST
In security, when you have to restrict access to “resources” (websites, files, IP addresses, ports, etc), you can deploy while or black lists. The term “white list” refers to a list of resources which are allowed or granted. At the opposite, a black list refers to resources which are denied
BruCON 2010 CFP Announced!
After a great first edition in 2009, BruCON will be back in 2010! Two days of trainings and two days of talks. The Call for Papers (CFP) has been announced and will remain open until 30th of April 2010. Submit directly your propositions via the dedicated tool, here.
Importing Secunia Advisories into a SIEM/OSSEC
Secunia is a security company which, amongst other activities, maintains a huge database of vulnerabilities. On their website, they describes their business like this: “Secunia collects, evaluates, verifies, and analyses security information. This security information is available through our databases and is distributed to our customers, segmented according to their
Show Me Your Browser, I’ll Tell You Who You Are!
To surf the web, you need a specific application: a browser. Today, this piece of software is delivered by default with all operating systems and becomes more and more used, even for non-related Internet stuff (Lot of applications or devices are manageable using a web interface). For some companies, the
Manifest for a Standard of Priorities Order
Priorities are a common parameter in applications. Examples are multiple. In support applications, priorities are used to define the urgency of the reported problem. When you configure softwares, priorities may help to re-order similar actions. In protocol specifications, priorities are also used to perform decisions (routing protocols are a good
FOSDEM Turns Ten!
I’m back from my daily visit to the FOSDEM. This two-days event organized in Brussels hit the 10th edition! Congratulations! I attended FOSDEM for several years and the success is continuously growing. This is good! It means that the interest in free software is growing too! Even better, like any
Grandma and her Banker!
Yesterday, I received the e-mail below, forwarded by a friend. Usually, I don’t react on such e-mails (who do not receive daily PowerPoint files, jokes or funny messages in his mailbox?). But this time, it was quite realistic. This is a letter sent by a Grandma to her bank. There
ixquick: Search and Now Browse the Web Anonymously
ixquick.com is a search engine amongst lot of others. But it claims to protect the visitors by keeping no trace of the search queries nor any other sensitive information. More classical search engines do not hesitate to collect and store information about you. They also claim that those data are