Manage the pain in the rear passwords

| 0 comments

At this time no matter where you turn you likely require a password. For this reason you need a way to manage those passwords in order to prevent others from accessing your private data or worse making it much more difficult for you password to be cracked if a service you use is ever breached. Of course, we all know that no service is ever breached and if you believe that then the safest password for you is Password1. Now if you are old school, you could always use the The Personal Internet Address & Password Log Book. Of course, …

Continue reading

Preparing for DEFCON 23

| 0 comments

It is hard to believe that almost a year has gone by and the desert heat of Las Vegas, NV is calling out to hackers of all ages from all over the world. The annual DEFCON conference is just a little over three weeks away and this year is very likely to bigger and better than the previous year. The change of venue from the Rio over to Paris & Bally’s should be much better. I say this only because last year there was roughly 14,000 attendees and to be honest the Rio was just too crowded for my taste. …

Continue reading

Mr. Robot

| 0 comments

If you’re a geek like myself then you have probably seen many television shows that fall flat dealing with the topic of cyber security in this day of the Internet of things. Two shows that I watched were Scorpion and CSI Cyber and both of them made me laugh. I mean listening to the cast speak all the correct buzz words and having flashing gadgets does not make a great, or even good television series. If you have not seen either of these shows, give the following trailers a watch. Scorpion Trailer CSI Cyber Trailer Mr. Robot With the release …

Continue reading

Creating a proxy chain in Linux

| 0 comments

There obviously are time that you may want to make use of a proxy server in order to provide yourself a level of anonymity that you may otherwise no have. Proxies also provide benefits in terms of restricted content that may be filtered with your region or country. Think of it this way, if YouTube is blocked in the Middle East then a proxy may help you to overcome that block. Now to be clear a proxy server also helps to increase performance by storing a copy of frequently used webpages. When a browser requests a webpage stored in the …

Continue reading

Security via obfuscation: MAC Address

| 0 comments

Every network interface card has a unique 48 bit identifier known as a MAC address. This address is burned into the EEPROM on the card, and often is used by networking equipment to track users as they come and go, frequently associating MAC address to a hotel, credit card, credentials, and so on. In fact, even most consumer gear will record the MAC addresses of all computers that have ever issued DHCP requests to them, and these logs usually cannot be purged. When you combine this with the fact that most Cable/DSL service providers will also record your MAC address …

Continue reading