There is one fact with humans: once they took some habits (in this case – bad habits), it’s very difficult to ask them change their behavior! It’s even true in information security. Today, we have access to plenty of awesome online applications which help us in our day-to-day activities. Thank
Tag: internet
GoDaddy Outage: RFC for Dummies
Yesterday was a black day for GoDaddy.com. During a few hours all they hosting services were interrupted. Mail, websites but, worse, all the DNS services were unavailable. The outage was caused by a member of Anonymous as said on Twitter but it’s not yet clear. Personally, who’s behind the attack,
You Just Have Been Erased! Are You Sure?
This is a never-ending story! People will never realize that once data has been published online, it is a nightmare to try to remove it. Here is another example… In parallel to this blog, I’m playing with another website called leakedin.com. The purpose is to educate people about the huge amount
Biology Rules Apply to Infosec?
In biology, it is proven that consanguinity between members belonging to the same group (example: people living in the same closed area or animals from the same breed) may affect their resistance to certain diseases or reduce certain physical characteristics. It’s important to keep some level of diversity. The latest
We Survived the World IPv6 Day!
… and the first World IPv6 Day! This first major event to promote the version six of the IP protocol looks to be a success for most of companies. For most users, it was completely transparent as network administrators prepared all the required stuff on the background. Maybe you were
Ready for the World IPv6 Day?
Next Wednesday will be the 1st World IPv6 Day! Are you ready? What are you plans? Unfortunately, I’ll be visiting a customer but I’ll try to grab some popcorn, coke and to keep an eye on the Internet. The goal is simple: Make a maximum of web sites and online
Carrier Grade NAT VS IPv6
Yesterday I went to a cocktail organized by ISPA, the Belgian Internet Service Providers Association. I worked several years for ISP’s and I trying to keep in touch with them to gather interesting information about market trends. The topic of the event was “IPv6” (what a surprise!). Eric Vyncke, CTO
Escaping Censure with Tor Hidden Services
Tor aka “The Onion Router” is a well known network running on top of the regular Internet. It protects the confidentiality of communications between users and regular online services. As the multiple layers of an onion, Tor is a worldwide decentralized network based on layers. When you need to connect
No, the Internet will not Colapse…
In May 2008, I wrote a blog post about IPv6 (Will Finally IPv6 Arise?) with a date: 2011. We reached the deadline foreseen and it’s now official: IANA is running out of IP addresses. IANA (“Internet Assigned Numbers Authority“) is the organization responsible of the assignments of IP addresses to
Tunisia Tracks Users with JavaScript Injection?
Disclaimer: The information reported below has been translated from French to English with the approval of a friend who also released the information on his blog. His server was hit by a DoS attack. Feel free to relay the information! When you try to access big websites like Facebook, Google