Newer << 2 >> Older

Laptop Hardening

Sept. 17, 2011, 1:16 p.m.

 

A few weeks ago I saw an interesting post on slashdot about the steps someone had taken to harden their laptop. Upon reading the summary on slashdot I made a mental note to read the article later. I expected to find some parts of his setup insufficient, but it turned out to be pretty comprehensive. There are plenty of hardening guides out there, but this blog entry did a really awesome job explaining the specific attack vectors he was trying to counter including: Simple Theft Evil Maid
Read More

^ top

Defcon 19

Sept. 1, 2011, 6:15 p.m.

 

Whew, a lot has happened since I last posted. I got married, honeymooned in Hawaii, took a trip to San Diego for a research project, then went to Las Vegas for defcon. I figured I should do a quick write-up. Defcon was at the Rio this year, and they brought back defcon tv, so we were actually able to watch several talks in the comfort of our hotel room. It worked out really well for those 10 am talks that are hard to get up for. I stayed at the Rio this year (didn't stay at the Riviera last year
Read More

^ top

Using Tor for anonymous browsing

June 9, 2011, 1:23 p.m.

 

Another blog entry I wrote for work was posted. It actually complements my last post pretty well, so I decided to post it here: It may or may not be a surprise to you that browsing the internet normally can give away a lot of information about you to anyone who can see the traffic. This means anyone between you and the site you’re viewing can see what server you’re connecting to, what your IP address is, etc. Also, the owners of the sites you’re viewing also will be able to see your pu
Read More

^ top

Browsing (More) Securely Using OpenVPN

May 6, 2011, 4:34 p.m.

 

Someone I know is going to a certain country with heavily restricted internet access (tomorrow, actually). They asked me if there was any way they could access sites that might be blocked by the government (like Facebook). I figured if we set up both a VPN and SSH tunneling, then one of those services is likely to work while they're over there. By using a VPN, you can send all your internet traffic out through a server in America, thus circumventing any blocking they have in place where you're c
Read More

^ top

Basic Steganography Explained

March 2, 2011, 10:43 p.m.

 

A couple days ago I wrote a blog entry for work. I figured I would repost it here because, hey, it's already written and I haven't posted anything in a while... Anywho, here you go: Have you heard of steganography before? It's a strange word, but the idea behind it actually makes a lot of sense. Basically it just means the practice of hiding some sort of data inside some other data. Perhaps you've seen messages before that have one meaning when read regularly, but then if you skip eve
Read More

^ top

Newer << 2 >> Older