Since Monday, April 7, the Internet is being rocked by the news about Heartbleed (CVE_2014- 0160), a serious vulnerability in the popular OpenSSL crypto library. Our
Category: Network security
OpenSSH hardening for cloud machine – Two-factor authentication – part 2
I enthusiastically use two-factor authentication whenever possible because static passwords aren’t the best mechanism to mitigate risk… Traditional passwords are vulnerable to social engineering, key-loggers,
What I saw at #30c3
The original post comes from the author’s blog at http://h4ck.go.ddamn.it/. This year’s CCC congress, 30c3, took place at the Congress Center Hamburg from the 27th to the
Don’t run a Tor router and a hidden service from the same connection!
Today’s post covers Tor hidden services and their anonymity. In the first few paragraphs I will provide some basic, high level information on the Tor network
O, BIND, BIND, wherefore art thou BIND?
This blog post is about service fingerprinting DNS servers on Internet. The most straight forward way to identify the version of a DNS server is
Complex routing with OpenBSD
We had to solve a routing problem for a non common network setup. I won’t get into details on why we chose to do it