-
How to save/restore iptables rules on Ubuntu?
This might be an obvious thing to old Linux-heads out there, but it sure caught me off-guard, so there might be some use in spelling it out: iptables-save and iptables-restore do not actually save/load the iptables rules to/from an external file. You are responsible for redirecting the output of iptables-save to a file and modifying…
-
How eco-friendly is a BMW?
The short answer is: I don’t know š While I was watching National Geographic, I caught a glimpse of the BMW “Efficient Dynamic” advertisement campaign. The claims made by this campaign were quite extraordinary and – being the cynic that I am – I thought: hang on, this sounds too good to be true. The…
-
Recouping your data from a hung program
Scenario: you are typing away in your blog editor on Ubuntu doing a (somewhat) Flash-heavy post. You make the mistake of hitting “Preview” and the blogging software hangs. How can you get your post out? Find the PID of your blogging software Coredump it (gcore [PID] – this will create a file called core.[PID] in…
-
Congratulation to AV-Comparatives!
AV-Comparatives is an independent, well-known and well respected testing organization in the AV/Anti-Malware field. They recently published two reports and one meta-report: Whole Product Dynamic Test Performance Test Summary Reports Go read them if you have questions like “which product is the best for me?”. Thank you Andreas for providing a great and impartial service.…
-
Don’t listen alone!
Do you like Linux? Do you listen to podcasts? If you’ve answered yes to both of those questions, you should know what LUG Radio is (if not, do a quick checking – I promise you that it will be worth it!). The bad news? They stopped it in 2008. The good news? A documentary titled…
-
delicious/cdman83
A long overdue “linky” post: Internet Guide | dyn.com Posted: 22 Oct 2009 04:55 AM PDT Dyn (of DynDNS) is also getting in the internet content filtering business. About the Fitbit Posted: 23 Oct 2009 11:10 AM PDT BorderWare ReputationAuthority Posted: 23 Oct 2009 12:09 AM PDT Petabytes on a budget: How to build cheap…
-
Schneier videos
Bruce Schneier is always fun, and together with Markus Ranum he is extra fun (sidenote: although it is title “face-off”, they agree more than they disagree): Schneier-Ranum face-off, part1: The future of information security Schneier-Ranum face-off, part 2: Social networking Schneier-Ranum face-off, part 3: Compliance and security Schneier-Ranum face-off, part 4: Cybersecurity coordinator Schneier-Ranum face-off…
-
New challenges
After missing the announcement for the second part of the Network Forensics Puzzle (yes, Iām subscribed the feed now!) I would like to regain your trust by bringing two other contests to your attention: Miracle on Thirty-Hack Street from ethicalhacker.net the sevenfour challenges (a ākeygen-meā type of challenge) Bonus content: t2ā09 challenge solutions (via the…
-
A game of Chinese whispers
Yet an other example of real-life Chinese whispers in the security journalism: A Hungarian online news site published an article titled āHackers tried to steal user data from Amazonā (here is a somewhat usable automatic translation for the non-Hungarian speakers). I assume that the information went like this: What happened ā> What the security company…
-
Twitter hacked
It had to happen, didnāt it? Iāve fired up Pidgin with the microblog-purple plugin, only to get an āinvalid certificateā error for twitter. Iāve quickly became nervous, since a quick digging indicated that I was getting the wrong IP address for the domain twitter.com. My first thought was: āIāve been compromisedā. After quickly verifying my…