not idle

Archive for the 'security' Category

Advanced Cyber Defence Centre: Android IDS

Tuesday, November 5th, 2013

Within EU project Advanced Cyber Defence Centre (ACDC) we are developing solution for detection of malware URLs. Here you can find short screencast depicting detection of malware URLs:

Read the rest of this entry »

CloudExpo Europe 2013, London

Saturday, February 2nd, 2013

Tuesday 29th and Wednesday 30th of January, I attended CloudExpo Europe conference in London. This is short overview on the conference from my point of view. I was most interested into talks given in the conference rooms with topics about: Big Data / Mobile & Unified Communications Virtual Infrastructures & Platforms Security & Governance and [...]

Read the rest of this entry »

Even though most modern, user-friendly Linux distributions do not do this by default, it is the least to say advisable to create, during installation, a separate partition for the ‘/home’ folder, and another one for the root of the filesystem (‘/’). What does this mean? Partition are logical segments that correspond to physical parts of [...]

Read the rest of this entry »

When I wanted to pack a simple java desktop application as a Web Start application I had problems with already signed jars – after Web Start dialog showed on the screen, I got “jar resources in jnlp file are not signed by the same certificate” problem. There exist other ways to tackle the problem (for [...]

Read the rest of this entry »

You can’t see the latest series in Hulu because you are not in the USA? You need to keep the government (or anyone) from knowing what you do in the Internet and who you talk to? Are you trying to reach content that is censored in your country? Are you starting a revolution such as [...]

Read the rest of this entry »

We have noticed computers having problems with multiple VPN connections on a server of ours. Let us quote the serverfault‘s forum: If you want to support simultaneous connections with the same certificate you need to enable the *duplicate-cn* option in your configuration. From the man page: –duplicate-cn Allow multiple clients with the same common name [...]

Read the rest of this entry »

Data security on encrypted hard disk

Tuesday, January 13th, 2009

When we look at security of laptop computers, many  people think that encrypting their hard drive will be enough to protect their data in case a laptop gets stolen. Basically that is much safer, than if it is not encrypted. When laptop is stolen even encrypting hard drive may not save your data from thief’s [...]

Read the rest of this entry »

Defcon 16 – Part 5 – Hardware Trojans

Monday, December 15th, 2008

Demonstration of hardware trojans In modern fast evolving and full of electronics world, hardware trojans are an emerging threat especially with the growing number of electronic devices and multitude of manufacturers all over the world. On this years Defcon 16 CVORG, a research group located at the University of Delaware’s Department of Electrical and Computer [...]

Read the rest of this entry »

Snort Plug-in Development Snort, as a widespread security platform, had it’s part in Defcon this year, too. The presentation was about the usage of Snort and it’s plugins. The basic idea was to show the extensibility of Snort via plugins. It is highly modularized. It has Snort rules, various output plugins, preprocessors for detection (alerting) [...]

Read the rest of this entry »

Defcon 16 – Part 3 – Port Bunny

Monday, December 15th, 2008

Port Bunny Nice presentation of the other port scanner was Port Bunny. It was created from the ground up, because authors didn’t want to include all the legacy ideas of how the port scanning should be done. It is meant to be run on a dedicated machine with no other software running (games, browsers etc.) [...]

Read the rest of this entry »