I.T. Security and Linux Administration:

August, 2013


August 31, 2013  2:51 PM

Dotless Domains?



Posted by: Eric Hansen
security

A recent article on Slashdot discussed the aspect of Google requesting to start using dotless TLDs.  While ultimately ICANN denied this request, its interesting to see...

August 30, 2013  4:30 PM

TrueCrypt vs. dm-crypt+LUKS



Posted by: Eric Hansen
security

TrueCrypt is a very popular option for encrypting data, while dm-crypt+LUKS (LUKS is a module for dm-crypt) is an unsung hero of sorts for those who don't want to install a lot of software.

  • TrueCrypt allows encrypting an entire hard disk, while I haven't found a way for dm-crypt to do...


August 30, 2013  3:48 PM

IT Security Scares That Aren’t



Posted by: Eric Hansen
security

There will always be people who make a mountain out of an ant hill.  However, it hits me in a sore spot when people like to make a simple issue seem like Armageddon. The Register posted an article about


August 30, 2013  3:03 PM

Compliance, What’s That?



Posted by: Eric Hansen
security

"Being compliant" is a big buzz word as of late that really adds nothing to the company needing it.  Chances are people will be able to tell you how they can make you compliant, but not be able to tell you why you should be.  Granted, the flip side is that if you're looking into compliance you...


August 30, 2013  2:30 PM

Security for SMBs: Criteria



Posted by: Eric Hansen
security

While this won't fit the mold for every SMB (small and medium business) out there, it will still give others an idea of what should be considered.  This will assume the SMB wants to expand in the future.

1. Scalable

Most SMBs do not want to stay in that classification forever.  If the...


August 29, 2013  3:35 PM

Dropbox Client Reverse Engineered



Posted by: Eric Hansen
security

At this year's USENIX talks, an interesting presentation was given describing how two people reversed engineered Dropbox's client.  This project, performed by Dhiru Kholia of Openwall and...


August 29, 2013  3:14 PM

Fault Tolerance With 1 DC?



Posted by: Eric Hansen
security

According to a recent article on eWeek, Amazon's US-EAST-1 DC (or "AZ") failed...again.  This isn't the first time and won't be the last that the DC has issues.  However, what struck me funny was...


August 29, 2013  3:03 PM

Tor or Proxy: Which To Use



Posted by: Eric Hansen
security

Two common threats a network administrator will deal with involving people trying to circumvent content-filtering proxies is people using a proxy, as well as Tor.  While fundamentally they are the same there's also some distinct differences between the two.

Tor

The purpose of Tor is to...


August 29, 2013  2:39 PM

100% Increase in Tor Usage for August



Posted by: Eric Hansen
security

The month of August has apparently been a busy one for the Tor network. For those unfamiliar with what Tor is, in the shortest sense possible it acts as a multiple-endpoint VPN service. It operates on what is called onion technology, in that there are various levels of security implemented...


August 29, 2013  9:09 AM

When Is Secure Too Secure?: Encryption Edition



Posted by: Eric Hansen
security

After reading an interesting article on posing the question of why we are still using RC4 it got me thinking, why not? Now, the article itself states that while its not gone the route of...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: