fnsecurity.org
##security homepage
http://www.fnsecurity.org/staff.shtml
As mentioned elsewhere, we'd appreciate it if folks attempted to be reasonable and civil, and employ self-management of the channel employing the equality through simplicity. Principle wherever possible. That said, there are certain scenarios in which you might need a staffer. Our staffers may not be o inchannel, but that doesn't mean they aren't around - if you need to find out which staffers are around and who they are, try chanserv - /chanserv access # security list. Adam vollrath / axisofentropy.
blog.sebastien.raveau.name
Tricks of the Trade: Playing with DNS servers... some more
http://blog.sebastien.raveau.name/2009/02/playing-with-dns-servers-some-more.html
Tricks of the Trade. Tuesday, February 17, 2009. Playing with DNS servers. some more. Killing time in the metro by listening to podcasts of past security conferences, I got the idea of using DNS caches to check IP-spoofing capability. Now, the easiest way to check if you can send packets to the Internet with a fake source IP address would be with two computers (in different ASs), but that's no fun, is it? June 29, 2010 at 10:13 AM. Thanks to Archangel Amael from the Backtrack Forums for reporting the pro...
blog.sebastien.raveau.name
Tricks of the Trade: A great loss
http://blog.sebastien.raveau.name/2013/11/a-great-loss.html
Tricks of the Trade. Monday, November 11, 2013. I wish I were breaking radio silence with something else but I just received confirmation that Cédric Blancher. The security researcher and friend whom I was referring to in my previous post, died in an accident yesterday. Subscribe to: Post Comments (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.
blog.sebastien.raveau.name
Tricks of the Trade: April 2009
http://blog.sebastien.raveau.name/2009_04_01_archive.html
Tricks of the Trade. Friday, April 17, 2009. Just a quick tip before the big monthly blog post :-). Today I was asked by a friend if it was possible to assign different network interfaces to different programs for their Internet traffic. As bandwidth-intensive applications are often also the ones that don't really require privacy, one could imagine categorizing programs in a way so as to watch Internet TV over the Wi-Fi network while corresponding over the cable. Create a "wifi" user. Sudo -u wifi vlc.
blog.sebastien.raveau.name
Tricks of the Trade: February 2009
http://blog.sebastien.raveau.name/2009_02_01_archive.html
Tricks of the Trade. Tuesday, February 17, 2009. Playing with DNS servers. some more. Killing time in the metro by listening to podcasts of past security conferences, I got the idea of using DNS caches to check IP-spoofing capability. Now, the easiest way to check if you can send packets to the Internet with a fake source IP address would be with two computers (in different ASs), but that's no fun, is it? Subscribe to: Posts (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.
blog.sebastien.raveau.name
Tricks of the Trade: December 2009
http://blog.sebastien.raveau.name/2009_12_01_archive.html
Tricks of the Trade. Sunday, December 6, 2009. On the legal uncertainty surrounding security education in France. By Cédric Blancher of EADS (in French sorry, automated translation to English here. Basically it discusses a highly subject to interpretation French law. That criminalizes informing people about dangers in Information Technology, and has me pulling my hair out to find interesting yet completely inoffensive. Stuff to tell you on Information Security. Subscribe to: Posts (Atom).
blog.sebastien.raveau.name
Tricks of the Trade: November 2013
http://blog.sebastien.raveau.name/2013_11_01_archive.html
Tricks of the Trade. Monday, November 11, 2013. I wish I were breaking radio silence with something else but I just received confirmation that Cédric Blancher. The security researcher and friend whom I was referring to in my previous post, died in an accident yesterday. Subscribe to: Posts (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.
blog.sebastien.raveau.name
Tricks of the Trade: January 2009
http://blog.sebastien.raveau.name/2009_01_01_archive.html
Tricks of the Trade. Monday, January 12, 2009. More on encrypted repositories and the usage of EncFS. Judiciously pointed out to me, synchronizing block-ciphered data (typically Rsync EncFS in aes-256-cbc mode, which I mentioned yesterday) will induce a slight overhead on the amount of transferred data, because of block padding. This means software like Rsync could indeed benefit from internal support for repository-encryption. From the University of California and IBM shows. Feature is enabled in EncFS,...
blog.sebastien.raveau.name
Tricks of the Trade: Per-process routing
http://blog.sebastien.raveau.name/2009/04/per-process-routing.html
Tricks of the Trade. Friday, April 17, 2009. Just a quick tip before the big monthly blog post :-). Today I was asked by a friend if it was possible to assign different network interfaces to different programs for their Internet traffic. As bandwidth-intensive applications are often also the ones that don't really require privacy, one could imagine categorizing programs in a way so as to watch Internet TV over the Wi-Fi network while corresponding over the cable. Create a "wifi" user. Sudo -u wifi vlc.