Index ¦ Archives ¦ Atom > Category: Posts

Tunneling data over DNS

This is an overview of how Tunneling data over DNS works, for a tutorial see How to tunnel data over DNS.

Tunneling data over DNS isn't a new idea but it's one that surprisingly few people even in the security industry are aware of. Software to do dns tunneling has …


Security and the Media

It's time for me to don my grumpy old man pants and have a whinge about how the attention of the main stream media is like a kitten with glittery bauble. Running all over the place focusing on the flashy and the new instead of focusing on the real issues …


Estimating the security of software

Estimating the security of software is something that most systems administrators do instinctively, whether consciously or subconsciously. I have heard people say things like "Don't use WordPress it's always getting hacked", "Linux is more secure than Windows"1 or "Macs don't get viruses"2. All of these are estimates about …


Backup to S3 and restore to EC2

There is an old saying that "there are two types of sysadmins, those that do make backups and those that will make backups". Hopefully there are not too many of the second group. But backing up the data is only part of the picture, you also need to think about …


The best crypto is the crypto you don't see

Moxie Marlinspike, a security researcher and cryptography expert for whom I have a lot of respect published a somewhat controversial article GPG And Me. Moxie says that he thinks of GPG

"as a glorious experiment that has run its course"

And I hate to admit it, but think he is …

Creative Commons License
Content on this site is licensed under a Creative Commons Attribution 4.0 International License.
Built using Pelican. Based on a theme by Giulio Fidente on github.