I.T. Security and Linux Administration:

security


May 30, 2013  6:43 PM

“Malware in your system? Good”



Posted by: Eric Hansen
security

Who really thinks that allowing to protect IP (intellectual property) by locking it in with malware is such a great idea?  Who?! Basically the idea is to stop pirating software and people stealing software and other IP.  The law would give the creator rights to basically have a backdoor to the...

May 30, 2013  5:54 PM

Outlook.com vs. GMail : Part 1 – Why



Posted by: Eric Hansen
security

A while ago Google announced its discontinuation of the free tier of Google Apps (basically Google providing email, storage space, etc...) free to businesses.  It also so happened that within the next couple of months, Microsoft announced Outlook.com, which was set to take the place of GMail...


May 30, 2013  5:30 PM

First Ubuntu bug FINALLY fixed



Posted by: Eric Hansen
security

Ubuntu, with its first release (and first bug) in 2004, has finally marked the first bug as fixed...about 9 years later.  What is the first bug, you ask? "Microsoft has a majority market share" If you compare and contrast 2004 with 2013, it makes sense, doesn't it?  Windows has seen its...


May 30, 2013  5:11 PM

Gotta love captcha



Posted by: Eric Hansen
security

[...] a recent We The People petition at the White House, asking the administration to support the treaty for...


April 30, 2013  10:23 PM

Web App/Vulnerability Scanner



Posted by: Eric Hansen
security

I want to know something: what scanner(s) do you use to assess the security of your systems, programs, network, etc...? For example, Metasploit and Nessus are two of the most popular in this field, but there's also ones such as OpenVAS, W3af, Nikito. Of the one(s) you use, why do you? What...


April 30, 2013  7:38 PM

Usability Systems



Posted by: Eric Hansen
security

While I've kind of put a hold on the monitoring solution (kind of shifted gears, so twiddling between that and another project), one thing is true regardless: usability needs to exist at the highest level. Bluntly, when writing UI, you have to write it with the mindset of people not knowing how...


April 24, 2013  1:54 PM

Quick Shell Trick – Find Memory Usage



Posted by: Eric Hansen
security

Unlike Windows (hear me out), its not as easy to find out how much memory a process is using.  Tools like ps report the RSS (resident set size), which "significantly overestimate memory usage" while PSS (proportional set size) measures "each application's 'fair share' of each shared area to give a...


April 21, 2013  10:33 PM

Writing a Full-Serviced Sysadmin App from Scratch – Part 3



Posted by: Eric Hansen
security

Probably the last post I'm going to make for the night (not sure, though) is about presenting the monitoring data. As mentioned, I was working on a backup solution previously.  In it, I used a Python module called Tornado to interact with HTTP requests that the client would issue.  This was...


April 21, 2013  10:18 PM

Writing a Full-Serviced Sysadmin App from Scratch – Part 2



Posted by: Eric Hansen
security

I touched up on a bit regarding why I'm writing my own monitoring solution.  This will cover some of the design aspects I had thought of initially and talk some on how things have progressed since. One of the first things that came to me was an authentication system.  Right now its still...


April 21, 2013  9:53 PM

Writing a Full-Serviced Sysadmin App from Scratch – Part 1



Posted by: Eric Hansen
security

For the past week or two now I've been working on an application to help monitor systems and services.  Kind of a bastard child of Nagios and Cacti.  There's a few reasons why I'm "reinventing" the wheel, so to speak.  But, I've decided to post here explaining the details, trials and...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: