security.morganstorey.com
Morgan's Security Blog: February 2011
http://security.morganstorey.com/2011_02_01_archive.html
Monday, 21 February 2011. Adobe and Fileopen pain. I resorted to trying to open the files with Windows, bam it tried to install a plugin called Openfile, I found there was a Linux version of OpenFile here. It was important I get the site to work, so I assured Fiona that windows was not the answer. I ran the following (as I had installed it manually from a deb from adobe just in case it was an old version issue) sudo sh /opt/Adobe/Reader9/bin/UNINSTALL. Just posting this for anyone else who has the issue.
morganstorey.com
Morgan Storey's Journal.: 09/01/2013 - 10/01/2013
http://www.morganstorey.com/2013_09_01_archive.html
Just my personal journal has been going for years now. Wednesday, September 04, 2013. Google goodness and Birthday. Sometimes Google is just too cool. I saw my phone had backed up a few of my photos and it had detected these photos seemed to go together and auto stitched them together. This from Geoffrey's recent birthday. Thank you Google. Peace out all, especially those awesome software devs and support peeps at google. Wednesday, September 04, 2013. Subscribe to: Posts (Atom).
morganstorey.com
Morgan Storey's Journal.: 05/01/2012 - 06/01/2012
http://www.morganstorey.com/2012_05_01_archive.html
Just my personal journal has been going for years now. Wednesday, May 30, 2012. Wednesday, May 30, 2012. Subscribe to: Posts (Atom). Yikes it has been a while since I posted. Well to . Awesome Inc. template. Powered by Blogger.
morganstorey.com
Morgan Storey's Journal.: 05/01/2008 - 06/01/2008
http://www.morganstorey.com/2008_05_01_archive.html
Just my personal journal has been going for years now. Thursday, May 22, 2008. Happy birthday to me. So my birthday has been and gone, probably not the best in memory, but it happens. I did however get a new job, in dedicated security, which is awesome. We also got our new car, a Hyundai Elantra. Anne is now crawling, and Geoffrey is talking more and more when he feels like it, saying things like thankyou, and apple, best yet has been trying to say helicopter he said applecopter. I can see how this is go...
security.morganstorey.com
Morgan's Security Blog: Service hiding/protection
http://security.morganstorey.com/2014/04/service-hidingprotection.html
Monday, 7 April 2014. This is a bit of operational security, but it took me a lot longer than I would have liked to do, and no one had an example like the below. This command will use the open source Access control list command line utility SetACL. To lockdown a service so that the user specified can't stop or start it, on testing it is even better than that the service dissapears from the services manager. Setacl.exe -ot srv -on "Service Name" -ace "n:domain username;p:start stop;m:deny" -actn ace.
security.morganstorey.com
Morgan's Security Blog: April 2014
http://security.morganstorey.com/2014_04_01_archive.html
Monday, 7 April 2014. This is a bit of operational security, but it took me a lot longer than I would have liked to do, and no one had an example like the below. This command will use the open source Access control list command line utility SetACL. To lockdown a service so that the user specified can't stop or start it, on testing it is even better than that the service dissapears from the services manager. Setacl.exe -ot srv -on "Service Name" -ace "n:domain username;p:start stop;m:deny" -actn ace.
security.morganstorey.com
Morgan's Security Blog: December 2009
http://security.morganstorey.com/2009_12_01_archive.html
Monday, 14 December 2009. Oh my, read this; http:/ www.omgubuntu.co.uk/2009/12/malware-found-in-screensaver-for-ubuntu.html. Then we Linux will have reached the popularity of windows, the weakest link will again be the user. Id=8597 most common attacks and you will see Linux and Macs are susceptable to the lot, through misconfiguration or user error. There will always be flaws, till we write code that can write its own code it may eventually create something almost flawless, or one of its children will.
security.morganstorey.com
Morgan's Security Blog: January 2012
http://security.morganstorey.com/2012_01_01_archive.html
Thursday, 19 January 2012. I had this thought last night as I was falling to sleep, and I realise it has probably already been talked about but I will explain how easy it is to do and how hard it is for existing detections to detect. Well if you already have a DNS server running on a server you control, pre-setup for something like DNS tunnelling. Subscribe to: Posts (Atom). Awesome Inc. template. Powered by Blogger.
security.morganstorey.com
Morgan's Security Blog: August 2014
http://security.morganstorey.com/2014_08_01_archive.html
Saturday, 16 August 2014. So I was recently having a discussion with a vendor about the insecurity versus usability of the google play store, yep there is malware there. Yep there are copycat scam apps. But google will eventually get it under control, just as apple has done. Ok so you can't trust either of them, but I think Apple is actually doing a better job of keeping the look-a-like scam apps out, at least I haven't heard of any yet, and this is coming from me a very anti-apple person. I wanted to tr...
morganstorey.com
Morgan Storey's Journal.: 06/01/2013 - 07/01/2013
http://www.morganstorey.com/2013_06_01_archive.html
Just my personal journal has been going for years now. Tuesday, June 18, 2013. Finally something to post that didn't fit in the other two blogs. I was invited out to see a play, and it is a comedy about a dystopian future. I then realised how much I like dystopian future stories and decided to lookup a few. I realised not only have I seen a vast majority of these films, I have liked every single one I have seen. I even liked Waterworld.I am sorry that I was the only one Mr Costner. Tuesday, June 18, 2013.
SOCIAL ENGAGEMENT