Every security policy provides guidance and requirements for ensuring adequate protection of information and data, as well as high-level technical and administrative security requirements for a system in a given environment. Traditionally, providing security for a system focuses on the confidentiality of the information on it. more>>
When it comes to public key cryptography, most systems today are still stuck in
the 1970s. On December 14, 1977, two events occurred that would change the
world: Paramount Pictures released Saturday Night
Fever, and MIT filed the
patent for RSA. more>>
Password authentication contains a lot of assumptions about security and
trust. Encrypted SSH tunnels and public key verification are two common
ways to ensure that your password is not compromised in transit. But,
what if it's the computer you're currently typing on that can't be
I'm the sort of person who doesn't like to install Java. I actually don't
like to install Flash either, but it's still tough to survive browsing
the Internet without Flash installed. There is one program that makes
me break my own rules, however, and that's Crashplan.
Years ago, I had the brilliant idea that all my users in the finance department should have complex passwords. This made perfect sense to everyone, since dealing with millions of dollars of revenue is something that should be secured. So, the passwords were changed with complexity requirements enforced. I slept better that night knowing our paychecks were no longer secured by passwords like "mustang" or "mrwhiskers".
Storing backups in the cloud requires a level of trust that not everyone
is willing to give. While the convenience and low cost of automated,
off-site backups is very compelling, the reality of putting personal data
in the hands of complete strangers will never sit quite right with
For a long time, my password tracking system was quite simplistic:
hope I remembered the right passwords for each site or record
them in an ordinary word-processor document. Such methods obviously
have great flaws. I might have a hard time remembering a password for an
infrequently used site, and a word-processor document isn't the most
secure place to store passwords. more>>
Bitcoin mining is so last year. Put your expensive GPU to use
When the Bitcoin mining craze hit its peak, I felt the tug to join this new
community and make some easy money. I wasn't drawn only by the money; the
concepts behind Bitcoin mining intrigued me, in particular the new use of
graphics processors (GPUs). With a moderately expensive video card, you
could bring in enough money to pay off your initial investment and your
electricity bill in a relatively short time.
iptables is the user-space tool for configuring firewall rules in the
Linux kernel. It is actually a part of the larger netfilter framework.
Perhaps because iptables is the most visible part of the netfilter framework,
the framework is commonly referred to collectively as iptables.
iptables has been the Linux firewall solution since the 2.4 kernel.