Wastholm.com

org.apache.commons.ssl.KeyStoreBuilder is able to convert OpenSSL style public/private keys into Java KeyStore files. It can also convert Java Keystore files into the PEM format that Apache likes.

Create a new keystore from an existing key and an existing certificate: java -cp not-yet-commons-ssl-0.3.9.jar org.apache.commons.ssl.KeyStoreBuilder PASSWORD KEY.pem CERT.pem

"Israelis, unlike Canadians and Americans, don't take s--- from anybody. When the security agency in Israel (the ISA) started to tighten security and we had to wait in line for — not for hours — but 30 or 40 minutes, all hell broke loose here. We said, 'We're not going to do this. You're going to find a way that will take care of security without touching the efficiency of the airport."

That, in a nutshell is "Israelification" - a system that protects life and limb without annoying you to death.

A great deal of money is at stake. Cyber security is a major growth industry, and warnings from Clarke, McConnell, and others have helped to create what has become a military-cyber complex.

...

American intelligence and security officials for the most part agree that the Chinese military, or, for that matter, an independent hacker, is theoretically capable of creating a degree of chaos inside America. But I was told by military, technical, and intelligence experts that these fears have been exaggerated, and are based on a fundamental confusion between cyber espionage and cyber war. Cyber espionage is the science of covertly capturing e-mail traffic, text messages, other electronic communications, and corporate data for the purpose of gathering national-security or commercial intelligence. Cyber war involves the penetration of foreign networks for the purpose of disrupting or dismantling those networks, and making them inoperable.

The chairman of British Airways [Martin Broughton] has launched an attack on "completely redundant" airport checks and said the UK should stop "kowtowing" to US demands for increased security.

...

Mr Broughton said no one wanted weak security, but he added: "We all know there's quite a number of elements in the security programme which are completely redundant and they should be sorted out."

Anyterm consists of some Javascript on a web page, an XmlHttpRequest channel on standard ports back to the server, an HTTP proxy such as Apache's mod_proxy and the Anyterm daemon. The daemon uses a pseudo-terminal to communicate with a shell or other application, and includes terminal emulation.

Key presses are picked up by the Javscript which sends them to the daemon; changes to the emulated screen are sent from the daemon to the Javascript which updates its display.

Performance is quite reasonable and SSL can be used to secure the connection.

Shell In A Box implements a web server that can export arbitrary command line tools to a web based terminal emulator. This emulator is accessible to any JavaScript and CSS enabled web browser and does not require any additional browser plugins. Most typically, login shells would be exported this way: shellinaboxd -s /:LOGINThis command starts a web server at http://localhost:4200 that allows users to login with their username and password and to get access to their login shell. All client-server communications are encrypted, if SSL/TLS certificates have been installed.

IS CYBERWARFARE (a) one of the biggest threats of the 21st century or (b) an elaborate hoax designed to extract money from gullible governments? Stuxnet, the computer worm running rampant in Iran's nuclear facilities, tells us the answer. An analysis

of the worm by computer security company Symantec makes it abundantly clear that a few lines of malicious computer code can trip electricity grids, burn out power-station generators, pollute water supplies and sabotage gas pipelines. That cyberattacks can become real-world attacks is no longer a matter of conjecture.

Germany's working group against censorship, AK Zensur, has analysed a few recent Scandinavian blacklists, allegedly meant to block sites containing child abuse material. Our less-than-surprising findings:

* From 167 listed sites, only 3 contained such material. * Two of them were listed on different blacklists since 2008, obviously without the authorities trying to take the sites offline. * All three were taken down by the hosting providers within hours or even minutes after receiving an AK takedown request by email.

So what were the reasons again that made access blocking an essential weapon in fighting child abuse?

U.S. Homeland Security Secretary Janet Napolitano said Tuesday it's too early to say when aviation officials can lift a ban on liquids on board flights despite international officials saying it could come as early as 2012.

Still good news though. I hadn't heard they were even considering ending this "if you bring toothpaste on a plane, you're helping the terrorists!!!1!" nonsense.

Prey is a lightweight application that will help you track and find your laptop if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free.

|< First   < Previous   117–126 (222)   Next >   Last >|