I’ve always used Fedora, basically since it was RedHat 7.0 … However, from that time until now, it has changed a lot.
Yearly Archives: 2014
LUKS: Plausible deniability on crypto containers
Since several years, we have faced a “transparency campaign” on cryptography. That means that the cipher announces itself as an “encrypted container”. This suppose a serious risk by exposing you to a rubber-hose attack.
LUKS (Linux Unified Key Setup) which is used by common Linux distributions is not the exception. But there is a hope to provide some kind of privacy.
Continue reading LUKS: Plausible deniability on crypto containers
Ubuntu Trusty 14.04 on your Android
Linux have a set of many nice applications that could fit and run on your android device.
You can install ubuntu trusty on your android by creating an special partition on your external sdcard and installing the base system there. ** Your phone must be rooted ** preferable with cyanogenmod 11.
How to price a pentest
Penetration testing and vulnerability assesment is a practice that every day becomes more important to our businesses. Today we need to make security stress tests in order to discover potential vulnerabilities that may exist in our systems.