Index ¦ Archives ¦ Atom > Category: Posts

Calculating a base64 encoded sha256 sum of inline scripts for your content security policy

A while ago I wrote a post on HTTP Security Headers and part of that invloved setting up a content security policy (CSP) and in that I say

I've done a SHA-256 hash of the script

and I just left it at that, simple right? Only now a it's little …


Occam's razor

I mentioned Occam's razor in a previous post and it's a philosophy I'm a huge fan of. Especially in information secuirty.

Often it's summed up as

"the simplest explanation is usually the correct one"

I think it's easy to get carried away with theories that could be posible rather than …


The HP Automated Storage Manager Server service terminated unexpectedly.

About a week ago we had an issue with a HP X1600 G2 Network Storage System Server. After rebooting we got an error message in the event log roughly ever minute with Event ID 7031

The HP Automated Storage Manager Server service terminated unexpectedly. It has done this 1 time …

Attribution is about more than just technical evidence

There is a story that's been doing the rounds lately about malware that took control of microphones and uploaded over 600 GB of audio to its command and control. As others in the security industry have pointed out this is a great example of where we can make fairly confident …


One hundred prisoners and a light bulb simulation

This is a little off my usual topic of IT Security but it's something I've been thinking about a bit lately. I recently came across the "One hundred prisoners and a light bulb" riddle. It was posed as:

A group of 100 prisoners, all together in the prison dining area …

Creative Commons License
Content on this site is licensed under a Creative Commons Attribution 4.0 International License.
Built using Pelican. Based on a theme by Giulio Fidente on github.