I.T. Security and Linux Administration:

security


September 30, 2013  12:00 PM

Create Your Own Two-Factor Authentication System: Setting Up Your Twilio Account



Posted by: Eric Hansen
security

For the point of this guide we are going to be using just our test account number.  The only difference between that and a purchased number is that every SMS or call is prefixed with a "Thank you for using Twilio" kind of message.  For demo'ing everything its a small price to pay.  I'll also be...

September 30, 2013  11:46 AM

Create Your Own Two-Factor Authentication System: Intro and Requireements



Posted by: Eric Hansen
security

Just like everything else with IT security, once a gem is found everyone jumps on it.  Originally I was going to offer this as a service for my business (still might to a degree), but instead thought I'd share with the Internet how to create yourself a beneficial two-factor authentication system....


August 31, 2013  2:51 PM

Dotless Domains?



Posted by: Eric Hansen
security

A recent article on Slashdot discussed the aspect of Google requesting to start using dotless TLDs.  While ultimately ICANN denied this request, its interesting to see...


August 30, 2013  4:30 PM

TrueCrypt vs. dm-crypt+LUKS



Posted by: Eric Hansen
security

TrueCrypt is a very popular option for encrypting data, while dm-crypt+LUKS (LUKS is a module for dm-crypt) is an unsung hero of sorts for those who don't want to install a lot of software.

  • TrueCrypt allows encrypting an entire hard disk, while I haven't found a way for dm-crypt to do...


August 30, 2013  3:48 PM

IT Security Scares That Aren’t



Posted by: Eric Hansen
security

There will always be people who make a mountain out of an ant hill.  However, it hits me in a sore spot when people like to make a simple issue seem like Armageddon. The Register posted an article about


August 30, 2013  3:03 PM

Compliance, What’s That?



Posted by: Eric Hansen
security

"Being compliant" is a big buzz word as of late that really adds nothing to the company needing it.  Chances are people will be able to tell you how they can make you compliant, but not be able to tell you why you should be.  Granted, the flip side is that if you're looking into compliance you...


August 30, 2013  2:30 PM

Security for SMBs: Criteria



Posted by: Eric Hansen
security

While this won't fit the mold for every SMB (small and medium business) out there, it will still give others an idea of what should be considered.  This will assume the SMB wants to expand in the future.

1. Scalable

Most SMBs do not want to stay in that classification forever.  If the...


August 29, 2013  3:35 PM

Dropbox Client Reverse Engineered



Posted by: Eric Hansen
security

At this year's USENIX talks, an interesting presentation was given describing how two people reversed engineered Dropbox's client.  This project, performed by Dhiru Kholia of Openwall and...


August 29, 2013  3:14 PM

Fault Tolerance With 1 DC?



Posted by: Eric Hansen
security

According to a recent article on eWeek, Amazon's US-EAST-1 DC (or "AZ") failed...again.  This isn't the first time and won't be the last that the DC has issues.  However, what struck me funny was...


August 29, 2013  3:03 PM

Tor or Proxy: Which To Use



Posted by: Eric Hansen
security

Two common threats a network administrator will deal with involving people trying to circumvent content-filtering proxies is people using a proxy, as well as Tor.  While fundamentally they are the same there's also some distinct differences between the two.

Tor

The purpose of Tor is to...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: