Unfortunately, TLS has been plagued by several vulnerabilities in recent years, making every HTTPS connection potentially unsafe.
In this article I’ll show you how to get the Grade A+ on SSLLabs (https://www.ssllabs.com/) through the appropriate use of GnuTLS Priorities.
Continue reading GnuTLS Priorities 2015
With the revelations of massive spying, we started to migrate to HTTPS, and… since then, there is a false sense of security around there…
Continue reading NEW: Almost Half of the Internet is vulnerable to google JS.
I’ve always used Fedora, basically since it was RedHat 7.0 … However, from that time until now, it has changed a lot.
Continue reading Detox Fedora 19/20/21
Since several years, we have faced a “transparency campaign” on cryptography. That means that the cipher announces itself as an “encrypted container”. This suppose a serious risk by exposing you to a rubber-hose attack.
LUKS (Linux Unified Key Setup) which is used by common Linux distributions is not the exception. But there is a hope to provide some kind of privacy.
Continue reading LUKS: Plausible deniability on crypto containers
Linux have a set of many nice applications that could fit and run on your android device.
You can install ubuntu trusty on your android by creating an special partition on your external sdcard and installing the base system there. ** Your phone must be rooted ** preferable with cyanogenmod 11.
Continue reading Ubuntu Trusty 14.04 on your Android
I developed an openvpn flasheable installer package for android. This OpenVPN, unlike others in the play store, have the capability to run entirely from a command line based interface. This option was included on CM10.2 but they have dropped it on CM11. Now you can use it again:
Penetration testing and vulnerability assesment is a practice that every day becomes more important to our businesses. Today we need to make security stress tests in order to discover potential vulnerabilities that may exist in our systems.
Continue reading How to price a pentest
Android is weak by nature… If you want to keep your android secured, you should take a lot of considerations. Every day, the software is designed to be more and more intrusive, however, such level of intrusion could expose yourself to hackers.
Continue reading Privacy Guidelines for android
One of the most serious problems using threads is the resource sharing, mutual exclusion locking and race conditions.
Continue reading C/C++ P-thread Code Safety – Avoiding Race Conditions