Posts about security
- Using BlueSky Features As Disinformation Tools
- Upgrading a docker-compose based Mastodon server to gain today's security fixes
- Banks: Stop relying on SMS based 2FA
- Messing around with Bing's AI Chatbot (possibly NSFW)
- Misusing Microsoft Defender For Domain Blocking Bypass Shenanigans
- Creating A Log-Analysis System To Autodetect and Announce Mastodon Scraper Bot Activity
- Examining The Behaviour of a Self Authenticating Mastodon Scraper
- Tightening Controls over Public Activity Feeds on Mastodon
- Implementing Geo-Blocking with OpenResty and LUA
- Analysing Clearnet, Tor and I2P WAF Exceptions using InfluxDB IOx
- Unable to SSH onto some systems after client upgrade: no matching key found and/or permission denied
- The Effectiveness Of SSH Tarpits
- OSINTing the OS-INTers and The Dangers of Meta-Data
- CentOS 8: Requiring a Yubikey OTP Press for SSH logins
- Barclays Online Banking gives 3rd Parties access to login pages
- Barclays Login Page Issues demo
- Cynet 360 Uses Insecure Control Channels
- Spamhaus still parties like it's 1999
- Twitter Screws Up With Data It Shouldn't Hold
- The Curious Case of BitFi and Secret Persistence
- Simple Reverse Shell
- A guide to designing Account Security Mechanisms
- Don't Use Web2Tor / Tor2Web (especially Onion.cab)
- The State of Mobile Banking (in the UK)
- Building a Tor Hidden Service From Scratch - Part 3 - General User Anonymity and Security
- The DVLA is routinely sending sensitive details via email
- CentOS: Requiring a Yubikey OTP for SSH Password logins
- Understanding the Difficulty of Assessing True Randomness
- Vulnerability: Infiltrating a network via Powerline (HomePlugAV) adapters
- Understanding Password Storage
- My Own Little HeartBleed Headache
- Falling Out Of Love With Siteground
- Why You Shouldn't be using SHA1 or MD5 to Store Passwords
- Checking for Outdated Joomla Extensions on your server
- RemoteHashStore Documentation
- PHP Changed Binaries
- Schema.org - Something's afoot..
- Darkleech Apache attacks on the rise, but is it really that hard to detect?
- Why you should always consult a professional
- Introducing PHPCredLocker Version 1
- Security in PHPCredLocker
- What is js.Runfore?
- Do We Take Security and Safety for Granted?
- Who's auditing the auditors? (it should be you)
- The Importance of Salting Stored Passwords And How To Do So Correctly
- Computrend Powergrid 902 Powerline Adaptors
- Security Flaw in the Computrend Powergrid 902 Adaptor
- Building Network Resilience Through Sensible Reporting Policies
- Update on the Play Breach
- Play coughs to Security Breach
- A User's Guide to Data Security and Control
- Could Governent Subversion Affect Your Business
- Howto Encrypt your Harddrive in Microsoft Windows
- Why is Encryption not used more?
- Educating Our Way to Security
- Tips on Good Password Management
- Update on the Fisher Hargreaves Proctor Security Breach
- Fisher Hargreaves Proctor Suffer Security Breach
- Whitepaper: Attack of the Clones - Is Homogeneity in a network environment safe?
- Analysis of a Compromised GMail Account
- Howto Encrypt Your Removeable Media on Linux
- Howto uninstall the Security Tool Scareware package
- A Developers Guide to Storage and Manipulation of Passwords
- The Importance of Changing Default Passwords
- Best Practice For Network Security in Small and Medium Sized Business
- Understanding the Nigerian 411 Scam
- Storage and Manipulation of Passwords: A Developers Guide
- What is a Computer Virus
- Republished: Tips for fighting password theft
- Republished: It's a Dangerous World
- Republished: Why you should never share Login Details
- Republished: Basic Malware Detector For Linux
- Email and Captcha Generation Scripts
- Republished: Hacking the Computrend Powergrid 902 Powerline Adaptor
- Installing and Using the SCR335 PGP Smartcard reader on Linux
- Republished: How Safe are Webcam Sites?
- McKinnon Loses Extradition Fight
- Republished: UK government wants to put our networks at risk