I found this article which speaks about a Russian firm which developed a tool to use NVidia GPU (up to four) to decrypt WPA or WPA2 encryption systems (bruteforce method). Here is the product: ElcomSoft Distributed Password Recovery. Conclusion? Wi-Fi protections are not sufficient enough to ensure confidentiality! Always use
Tag: Hardware
Audit Your Car Engine
KPI (Key Performance Indicators) are critical for a successful business. The same applies in security. By example, our daily goal is to: Reduce the number of incidents Reduce the unavailability of resources (downtime) Reduce the time between detection and action upon an incident detection Now, you can do the same
Workstation (Un)locking Using Bluetooth
When you use a workstation (PC, laptop or thin client), it’s important to lock it when you are away for a while or funny things may happen. Usually, the screen is automatically locked after a configurable inactivity period. To unlock it you need to type a password or, on some
DiY Network Sniffer
From time to time, network administrators have to use a sniffer to capture flows of packets . In a switched environment, packets are sent from a source to a destination and only the destination host can “see” the packet. To be able to receive all the packets sent into a
Use your GFX Memory as Swap
Modern graphics cards are now today with plenty of RAM. This memory has a very high throughput. If you don’t run a big X11 environment, why not dedicate this memory to another purpose? Swap space by example! Check out: http://gentoo-wiki.com/TIP_Use_memory_on_video_card_as_swap.
Your iPhone has a Good Memory!
I don’t have a iPhone yet. I’m waiting for the version “2” which should support 3G networks. Take care if you sell your beloved iPhone to an untrusted person: Your phone (as any other PDA or mobile phone) knows everything about you: emails, calls, SMS, visited websites. When the owner
Sesame Ouvre Toi!
New gadgets appeared on the access-control market: the online or “e-door locks”! New devices can be locked or unlocked from any browser (notebook, mobile phone, …), change the code or review the activity log. Read the news here.
Do not Underestimate Physical Security
Security in IT is everywhere: firewalls, proxies, anti-[spam|virus], IDS and more! But what about physical security to your IT infrastructure? Read the following story: Peter Gabriel‘s web site was off the web due to a server theft! I would like to know how the thieves performed! Why spend money to
Brrrrrrr!
In a previous post, I talked about whole disk encryption. More and more security incidents are reports by medias were laptop are stolen or list in the nature with thousands of ultra-confidential-top-secret-data. That’s why disk encryption becomes a hot topic at the moment. A “hot” topic? In fact, it’s more
Follow the cable…
Recorded this morning… Of course, this SDSL line is business critical!