Security & WebDev

Security & WebDev

YADM (Yet Another Dotfiles Manager) & Keybase

I use multiple Mac workstations to manage all my systems and services (AWS infrastructure, Kubernetes)  so it is a challenge to manage the keys and credentials needed to access those systems. YADM (Yet Another Dotfiles Manager) \<https://thelocehiliosan.github.io/yadm/\>__ does a great job of managing this files and storing them in a git repository but I wasn't comfortable hosting that repository on a public facing service (Github or Gitlab) so I took advantage of Keybase's private encrypted git repo feature.

2 min read
Security & WebDev

Circuit Simulator Applet - falstad.com

This is a very cool little app that I found after listening to Security Now Episode 233: Let's Design a Computer. Some of the basic circuits were hard to visualize and this app kind of brings them to life with animated current flow and some interactivity. For the podcast you'll want to look in the Circuits menu for the Logic Families/RTL for the circuits being discussed.

This java applet is an electronic circuit simulator. When the applet starts up you will see an animated schematic of a simple LRC circuit. The green color indicates positive voltage. The gray color indicates ground. A red color indicates negative voltage. The moving yellow dots indicate current.

1 min read
Security & WebDev

Easy Automated Web Application Testing with Hudson and Selenium » Vitamin Features »

| Vitamin Features » Easy Automated Web Application Testing with Hudson and Selenium | What will you get out of this article? Our set-up achieves the following:

  • It checks our Subversion repository every hour to see if anyone has committed any changes.
  • If they have, it updates the project from Subversion and builds it.
  • It then creates a clean version of our application database, loads in reference data and deploys the application on our app server.
  • A job is triggered that runs through a series of tests in a remotely-controlled web browser on the fresh application.
  • Anything that deviates from the accepted norm is logged and screenshots of the web browser are taken.
  • Screenshots of the browser are also taken for key pages of the site for later checking by a human.
  • If any of the tests fail, the developers responsible for the changes are notified by email of the problems.
  • Our issue tracker is updated with any issues that were fixed in the build.

1 min read
Security & WebDev

de-co-de: Apache Tomcat connector - mach-o, but wrong architecture

| de-co-de: mach-o, but wrong architecture | If you install the mod_jk.so connector yourself on OS X 10.5 intel you may get the following error.

| httpd: Syntax error on line 484 of /private/etc/apache2/httpd.conf: Syntax error on line 3 of /private/etc/apache2/other/mod_jk.conf: \ | Cannot load /usr/libexec/apache2/mod_jk.so into server: \ | dlopen(/usr/libexec/apache2/mod_jk.so, 10): no suitable image found.\ | Did find:\n\t\ | /usr/libexec/apache2/mod_jk.so: mach-o, but wrong architecture

This error is because apache is compiled as a 64 bit executable and configure builds a 32 bit shared library

1 min read
Security & WebDev

Ubuntu Unleashed: The Top Security Tools in the Ubuntu with 1 click Installation!

Ubuntu Unleashed: The Top Security Tools in the Ubuntu Repositories you may not know about with 1 click Installation!

Here is a collection of security tools that you should look through to add to your arsenal to help keep the peace on your pc/network or unleash war on others for whatever reason.

| Most of these are command line tools which need to be invoked via the Terminal: | Applications->Accessories->Terminal

1 min read
Security & WebDev

Mac OS X Security Configuration Guides -Apple.com

| Apple - Support - Security Configuration Guides | The Security Configuration Guides provide an overview of features in Mac OS X that can be used to enhance security, known as hardening your computer.

The guides are designed to give instructions and recommendations for securing Mac OS X and for maintaining a secure computer.

To use these guides, you should be an experienced Mac OS X user, be familiar with the Mac OS X user interface, and have at least some experience using the Terminal application’s command-line interface. You should also be familiar with basic networking concepts.

1 min read
Security & WebDev

Maltego - Paterva: A new train of thought

| Maltego - Paterva: A new train of thought | Maltego is a program that can be used to determine the relationships and real world links between:

| People | Groups of people (social networks) | Companies | Organizations | Web sites | Internet infrastructure such as:

| Domains | DNS names | Netblocks | IP addresses

| Phrases | Affiliations | Documents and files

These entities are linked using open source intelligence.

1 min read
Security & WebDev

Top 75 Security Tools

Top 75 Network Security Tools

Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. Many of the descriptions were taken from the application home page or the Debian or Freshmeat package descriptions. I removed marketing fluff like "revolutionary" and "next generation". No votes for the Nmap Security Scanner were counted because the survey was taken on an Nmap mailing list. This audience also means that the list is slightly biased toward "attack" tools rather than defensive ones.

1 min read
Security & WebDev

Destroy Spyware

TechTV | Dark Tip: Destroy Spyware

I have yet to find an application that detects adware and spyware before it's installed on your PC, so my recommendation is not to pay for adware/spyware removal software at this time. Simply use a combination of Ad-aware (freeware version) and Spybot - Search & Destroy to remove the offending software. I believe Norton is on the right track by combining antivirus software with adware/spyware-detection. With automatic updates and real-time detection, Norton could prove to be the ultimate removal tool for viruses, adware, and spyware. Only time will tell, and I'm sure McAfee has something up its sleeve as well.

1 min read
Security & WebDev

Mac OS X Security Advisory

| Mac OS X Security Advisory | Vulnerability: | Malicious DHCP response can grant root access

| Affected Software | Mac OS X 10.3 (all versions through at least 26-Nov-2003) | Mac OS X Server 10.3 (all versions through at least 26-Nov-2003) | Mac OS X 10.2 (all versions through at least 26-Nov-2003) | Mac OS X Server 10.2 (all versions through at least 26-Nov-2003) | Probably earlier versions of Mac OS X and Mac OS X Server | Possibly developer seeded copies of future versions of Mac OS X

1 min read