Next step in my investigations to implement a strong authentication process on my Linux laptop using the Yubikey. In a previous post, I explained how to use a Yubikey to authenticate on Linux with a PAM module. It works very well but, like I said in the previous article conclusion,
Tag: Hardware
Yubikey Authentication on Linux
In a previous article, I presented the Yubikey product. I also explained why, for security reasons, the usage of two separate Yubikeys could be a plus. One converted to provide a static password and the second left as is (to provide one-time passwords). I received my 2nd Yubikey a few
Yubikey: One Time Password vs Static Password
I received my Yubikey a few days ago! Very good service from Yubico. Living in Belgium, the key was sent from Sweden (three business days to be delivered, tracking number, safely packed, etc). For those who never heard the word “Yubikey”, a small introduction. The Yubikey is a very simple
New Corporate Laptop Setup
I got my new corporate laptop today, a Dell Latitude E6500, very nice computer. Working as a security consultant, I’m always on the road, connecting my laptop on customers or evil (free Wi-Fi access point or conference) networks . Fortunately, my company allows consultants, if they want, to manage their
JanusVA: Hardware Privacy Adapter
According to their website, JanusVM is … “a software that allows you to surf the Internet without oppression or censorship, while protecting your privacy, security, and identity. It has advanced filtering capabilities for modifying web page content, managing cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet
USB Key Remote Destruction
Ironkey is known to distribute very secure USB flash drives. Physically protected by a rugged metal case, they are water-proof and tamper resistant. Data protection is based on a builtin crypto chip (via AES). They announced a few days ago a new service: “IRONKEY INTRODUCES SILVER BULLET SERVICE TO ENABLE
Stuck Payment Terminal
I’ll not trust this terminal anymore! (Picture taken in the Louvain-La-Neuve shopping center last Friday) Fail!
Ubuntu on Medion Akoya e1210
Yesterday, I bought a new toy. There was a special offer in Aldi shops: A mini-notebook Media Akoya. The announced price was 399€. Arrived on site earlier (to avoid retired people waiting in front of the doors), it was available for 369€ but with a 80GB disk. Once at home,
Strong(er) Authentication
To perform strong authentication, you need to combine two or more of the following factors: Something you know (a password or PIN code), something you have (a token or a grid card), something you are (your finger print, voice or retina). By mixing those three factors, you can increase your
Don’t Trust Your (Wired) Keyboard Anymore!
Don’t trust your wire keyboard anymore! Computer keyboards, like other components generate electromagnetic waves. “Waves” means that they can be received by a third-party device and analyzed. It’s now done! Check out: Compromising Electromagnetic Emanations Of Wired Keyboards.