-
Ukraine War brings pain, blood and a lot of human losses.
Ukraine War brings also a spike in cyber attacks, perhaps because Russian is using it like a weapon to destabilize Europe and Ukraine.
In this scenario, it is crucial to enforce your security protocols. My Company started to install a Microsoft extension to remove admin access to all employs laptop, and installed a new set of anti-malware services.
Read More -
As you know, sometime Internet is a bad place (and not, I am not talking about Facebook :)
There are “bots” which scans github repo in search of an AWS Keys or other similar api keys, mostly for installing spam bots and so on. You should not version it but… what can you do if your teammate did it already?
Read More -
Some time ago I stumbled upon this Hacker News discussion on how disable Spectre mitigation.
(For what Meltdown and Spectre is, refer to this article on 2018)
It is sad to say but my Intel NUC centrino was slowed down a lot by these mitigation, and the same faith is shared by old Intel server. Disabling it on Linux and Windows has a very huge improvements.
Read More -
Meltdown and Spectre are two big vulnearbilities found in Intel and AMD chips out of there. The vulenarbility is so huge it affects up to 1995 chips.
On the raspberrypi, there is a very nice explanation of what Meltdown is.
First of all, the one who discovered this bug is a GENIUS, for sure.
Read More -
At Gioorgi.com we are not a true cloud fan, and reality is going on to collect proofs for us…
On June 20, 2011, Dropbox had a serious security bug. It was possible to login to an account with “a wrong password”. Like to say Dropbox account system was naked, because “a small number of users[…] could have logged into an account without the correct password”!
Read More -
Privacy is important: in the last days I have read the following on Slashdot:
"A Facebook employee has given a tell-all interview with some very interesting things about Facebook's internals. Especially interesting are all the things relating to Facebook privacy. Basically, you don't have any. Nearly everything you've ever done on the site is recorded into a database. While they fire employees for snooping, more than a few have done it. There's an internal system to let them log into anyone's profile, though they have to be able to defend their reason for doing so.[...]
via Slashdot: News for nerds, stuff that matters. -
At Gioorgi.com we evaluted a internet file system common gateway for connecting network resources. We compared two solutions: a webdav file system and an ssh-fs file system. The solution should be viable via MacOSX and Linux, but also Windows support will be a plus.
WebDAV
Read More -
T r u e C r y p t
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
Main Features:
Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Read More -
Versign is experimenting a new Phone software to gain maximum security.
The software will be able to generate a unique to use to log in your accounts, in a similar way a RSA Key does.
What’s the Password? Only Your iPhone Knows - Bits Blog - NYTimes.com.
Read More
