Types of activities that will become illegal under the proposed laws include making or supplying “hacking tools”- computer programmes or code that can help crack passwords or bypass security systems – and will be punishable by up to two years in prison. Isn’t this legitimate action for any security enthusiast, hobbiest or professional involved in […]
Archives for March 2006
Post-Mortem Data Destruction
[ad] 1. Introduction This article describes and partly implements a method to delete or re-locate, potentially sensitive and / or incriminating information from your UNIX flavoured machine, after the sad event of your death. An older version of this article has been published before, yet it has since disappeared from the Internet and the Google […]
SSL VPNs and OpenVPN – Part IV
4. Brief How-to …. Creating Multiple clients to Single site tunnels. Example of using PKI to create a client-to-site VPN: For a road warrior or roaming/multiple user scenario, static keys based VPNs don’t scale well. You will need to implement a PKI if you have Hub and Spoke architecture of VPN. From the OpenVPN.net website: […]
Windows Rootkits
Windows Rootkits are a big rarity in this modern web hacking tehnology… I won’t speak exactly about rootkits, because it’s impropriate to call them that way… why? Well rootkits are programs that aid you in getting access to root level users… So in the case we are using Windows rootkits we should call them admkits […]
SSL VPNs and OpenVPN – Part III
3. Brief How-to ….. OpenVPN and Site-to-Site Tunnels. OpenVPN can be implemented either Site-to-site or client-server model. I will take example configurations of both models. If you want to implement site-to-site configuration, the best way is to use static-keys instead of PKI. Using static keys, you can have your VPN tunnel up and running in […]