Zda sa, ze apple implementoval feature SMB packet signingu na MacOS, ktora rapidne zabija troughput na zistenie: With your share mounted – execute the following command from a Terminal: smbutil statshares -a You should get a list of fields for each share you have currently connected. Here are some values to pay attention to: SMB_VERSION […]
Posted on February 18, 2017, 11:37 pm, by tomas, under
security.
${IPTABLES} -A INPUT -p tcp –dport 7777 -m recent –set –name portknock ${IPTABLES} -A INPUT -p tcp –syn –dport 22 -m recent –rcheck –seconds 60 –name portknock -j ACCEPT ${IPTABLES} -A INPUT -p tcp –syn –dport 22 -j DENY
Posted on November 1, 2015, 11:40 pm, by tomas, under
security.
..sa vola dtrace /usr/sbin/dtrace a ma niekolko uskali 1;) vyzaduje root-a, odporucam sudo dtrace sudo -u myuser traced_command 2;) existuje nieco ako SIP As you may now Apple released their new OS X revision 10.11 this year with a great security feature built-in: System Integrity Protection. In a nutshell, this mechanism protects any system data and […]
sudo nvram security-password security-password %fa%cb%d9%d9%dd%c5%d8%ce In the password string, count the number of percent symbols, which are separators for the hex codes that represent a character of your password, where two hex code characters together represent one ASCII text character. Since the Calculator can only handle words up to 8 characters (16 hex characters), if […]
Posted on December 19, 2013, 8:07 am, by tomas, under
security.
Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG’s current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be […]
Pekny suhrn best practices pri zabezpecovani php webserverov Linux: 25 PHP Security Best Practices For Sys Admins
Posted on January 31, 2012, 2:59 pm, by tomas, under
security.
You tune to the right frequency,” says Kocher, who described the hacking procedure as involving use of a radio device much like a common AM radio that will be set up within about 10 feet from the smartphone. The radio-based device will pick up electromagnetic waves occurring when the crypto libraries inside the smartphone are […]
podporte peticiu sem: http://www.avaaz.org/en/eu_save_the_internet/?cl=1533693936&v=12249 ACTA – a global treaty – could allow corporations to censor the Internet. Negotiated in secret by a small number of rich countries and corporate powers, it would set up a shadowy new anti-counterfeiting body to allow private interests to police everything that we do online and impose massive penalties — even […]
Posted on January 13, 2012, 8:51 am, by tomas, under
security.
Analyza security experta ktory stravil nejaky ten den-dva analyzujuc standardne komunikance systemy moderneho auta. Celkom odstrasujuci priklad aky deravy software existuje v autach a ako sa po troske snahy daju tieto diery zneuzit na ziskanie “root” pristupu ku palubnemu pocitacu ..napriklad cez bluetooth handsfree, nedokumentovanu firmware-upgrade moznost CD prehravaca alebo exploitovanim WMA dekoderu pekne,poucne a […]
Posted on July 12, 2011, 11:18 am, by tomas, under
security.
To, ze nic nieje take bezpecne ako sa zda vam priblizi tento clanok o znamom vire Stuxnet ktory v roku 2010 spomalil Iransky jadrovy program.. viac v clanku sem