SSH is often required to access Linux machines that run on the Cloud infrastructure. SSH is perfect to keep confidentiality and integrity of data exchanged between two
GreHack 2013
I was in Grenoble on Nov 14-15 for GreHack, a security conference organized by a group of enthusiast students from the local university. (Full disclosure:
Win a free ticket to Grehack-2013-hacking-conference
A proud sponsor of Grehack-2013-hacking-conference on November 15 in Grenoble, Kudelski Security is offering a FREE event entry to the company’s Linked-in follower #999. Looking forward to
Is Facebook evil?
The popular Latin proverb Virtus in medio stat (Virtue stands in the middle) may be the answer to many essential questions in life. Facebook and
My rifle is bigger than yours – and it runs Linux
Yeah, baby! The Association Francophone des Spécialistes de l’Investigation Numérique (AFSIN) held its annual conference on September 10-12 in Neuchâtel, Switzerland. The JFIN (“Journées Francophones de l’Investigation
Softraid and crypto for OpenBSD 5.3/5.4
DISCLAIMER: This how-to must be taken as is, it should not replace the official documentation and is not meant to do so. It may be