Hacking: The Art Of Exploitation (2nd Edition) was released back in 2008, written by Jon Erickson and published by No Starch Press. I originally received a copy as part of a Humble Bundle and purchased physical copy in 2019 (19th printing!), off the bat that should show how much I enjoy this book. The book … Continue reading Hacking: The Art of Exploitation – Book Review (Security)
Author: Geek_Dude
Security: Symmetric / Asymmetric Encryption (Notes)
Symmetric encryption uses the same key to encrypt and decrypt information. Symmetric encryption is generally faster than asymmetric encryption. However, it has the issue of finding a secure method of sharing the key (e.g., password) for the encryption so that it may be used. Symmetric encryption includes: Block ciphers such as AES (Advanced Encryption Standard), … Continue reading Security: Symmetric / Asymmetric Encryption (Notes)
Security: OWASP Top Ten (Notes)
The Open Web Application Security Project (OWASP) provides a top ten security risks in web applications at https://owasp.org/www-project-top-ten/ . The ranking of risks can help developers (and organisations) make their applications more secure. The 2021 OWASP Top Ten Broken Access ControlCryptographic FailuresInjectionInsecure DesignSecurity MisconfigurationVulnerable and Outdated ComponentsIdentification and Authentication FailuresSoftware and Data Integrity FailuresSecurity Logging … Continue reading Security: OWASP Top Ten (Notes)
Security: Risk Assessment (Notes)
The National Institute of Standards and Technology (NIST) produced the NIST Special Publication (SP) 800-30 to help conduct risk assessments. A risk is where a threat intersects with vulnerability, e.g. where a vulnerability exists and is used by a threat. Threat sources can come in many forms such as: Adversarial e.g., individuals, groups, organisations and … Continue reading Security: Risk Assessment (Notes)
AWS – EC2 User Data: Preparing Ubuntu Instance For Ansible Management (AWS / Ansible)
I have used previous blog posts to discuss using Ansible to create / manage AWS EC2 instances, and using Terraform with Ansible to create / manage AWS EC2 instances. However, there are people that prefer to use the AWS web console over Infrastructure as Code (IaC). If you find yourself in the situation of creating … Continue reading AWS – EC2 User Data: Preparing Ubuntu Instance For Ansible Management (AWS / Ansible)
AWS Lambda – Stop Instances Outside Office Hours (Python / AWS)
I previously wrote about using some Python to stop AWS EC2 instances that had the tag "office_hours" and indicated that this could be automatically run via AWS Lambda. This blog post is a brief follow up with some notes on creating the Lambda function, using the Python from the previous blog post. Using AWS Lambda … Continue reading AWS Lambda – Stop Instances Outside Office Hours (Python / AWS)
Ansible – SSH and Password Protected Private Keys (Linux)
It is recommended to password protect private SSH keys, so if they do ever end up in the wrong hands then a password is still needed to access them. If you wanted to go really secure Ansible Vault could be used to encrypt the private key alongside the password. This would require the key to … Continue reading Ansible – SSH and Password Protected Private Keys (Linux)
Ring Doorbell 3 Fails To Connect To Wi-Fi
At the beginning of 2021 our household invested in a Ring doorbell. It's a pretty good device but in the early hours of 7th December something happened (possibly related to the AWS outage) and the doorbell decided that it no longer wanted to connect to the wi-fi network it's been using for months. This was … Continue reading Ring Doorbell 3 Fails To Connect To Wi-Fi
TCO: Total Cost of Ownership (Cloud)
The costs of using the cloud are sometimes discussed without taking into affect the Total Cost Of Ownership (TCO). In this blog post I am going to be looking at some of the potential TCO that may have been missed when comparing traditional "on premise" to Cloud services. Note: There are many Cloud Service Providers … Continue reading TCO: Total Cost of Ownership (Cloud)
Storing Data In The Cloud
The cloud offers many services for storing data which can be a double edged sword. In this blog post I am looking at some of the considerations that should be looked at before any data is moved into a cloud environment. Know Your Data The amount of data that you have may be staggering as … Continue reading Storing Data In The Cloud
You must be logged in to post a comment.