background preloader

Security

Facebook Twitter

TRESOR Runs Encryption Securely Outside RAM | IT-Sicherheitsinfrastrukturen (Informatik 1) TRESOR is a secure implementation of AES which is resistant against cold boot attacks. The basic idea behind this implementation is to store the secret key inside CPU registers rather than in RAM. All computations take place only on registers, no AES state is ever going to RAM. In particular, the x86 debug registers are misused as secure key storage. Running TRESOR on a 64-bit CPU that supports AES-NI, there is only little performance penalty compared to a generic implementation of AES.

The supported key sizes are 128, 192 and 256 bits (full AES). Running TRESOR on a plain old 32-bit CPU, supporting at least SSE2, is possible as well. Kernel patch: [tresor-patch-3.8.2_aesni] (Core-i series with AES-NI support; 64-bit) [tresor-patch-3.6.2_aesni] (Core-i series with AES-NI support; 64-bit) [tresor-patch-3.6.2_i686] (other x86 CPUs with at least SSE2; 32-bit) Further development from 3rd parties: [support for keydevices] (by Matt Corallo) (The original publication is available at Springer.)

How to Deploy HTTPS Correctly. By Chris Palmer and Yan Zhu Originally published on 15 Nov 2010. Revised on 12 Dec 2013. Internet technologists have always known that HTTP is insecure, causing many risks to users. Because HTTP traffic is unencrypted, any data sent over HTTP can be read and modified by anyone who has access to the network. As revealed by the Snowden NSA surveillance documents, HTTP traffic can also be collected and searched by government agencies without notice to users or webmasters. Given these risks, EFF believes that every website should support HTTPS on all pages as soon as possible.

While HTTPS has long existed as the bare minimum for web security, some websites have been slow to adopt it. This article is designed to encourage and assist website operators in implementing and improving HTTPS support. Background HTTPS provides three security guarantees: Server authentication allows users to have some confidence that they are talking to the true application server. Modes of Attack and Defense Conclusion. Blind Elephant. TLS Renegotiation and Denial of Service Attacks | Qualys Security Labs. A group of hackers known as THC (The Hacker's Choice) last week released an interesting DoS tool that works at the SSL/TLS layer. The tool is exploiting the fact that, when a new SSL connection is being negotiated, the server will typically spend significantly more CPU resources than the client.

Thus, if you are requesting many new SSL connections per second, you may end up using all of the server's CPU. The issue abused by the tool is not new, but what is new is that we now have a well publicised working exploit, and that always makes you pay attention. In addition, the tool uses the renegotiation feature, which means that it can force a server to perform many expensive cryptographic operations over a single TCP connection. But that's only if your server supports client-initiated renegotiation. If it does not, anyone wishing to perform a DoS attack against the SSL layer will have to fall back to using one TCP connection for one SSL connection. Technical Security Certification Roadmap.

BitLocker

Data Sanitization & Disposal Tools - Computing Services ISO. Homepage of PaX. Grsecurity. Grsecurity From Wikibooks, open books for an open world The latest reviewed version was checked on 26 July 2015. There are template/file changes awaiting review. Jump to: navigation, search This book is intended as a comprehensive up-to-date user guide about setting up and administrating a grsecurity-enabled system. Contents [hide] Introduction[edit] Overview Terminology How to Contribute Installation[edit] Obtaining Required Components Downloading grsecurity Downloading gradm Downloading the Linux Kernel Verifying the Downloads Configuring and Installing grsecurity Patching Your Kernel with grsecurity Configuring the Kernel Compiling and Installing the Kernel Administration[edit] The Administration Utility (gradm) Installation Usage Learning Mode Additional Utilities Controlling PaX Flags (paxctl) Displaying Program Capabilities (pspax) Managing the Executable Stack of Binaries (execstack) Runtime Configuration Through sysctl Troubleshooting Policy Configuration[edit] The RBAC System in grsecurity Policy Structure Grub.

Crypto-Gram: February 15, 1999. February 15, 1999 by Bruce Schneier President Counterpane Systems schneier@schneier. A free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. Copyright (c) 1999 by Bruce Schneier In this issue: Snake Oil The problem with bad security is that it looks just like good security. Many cryptographers have likened this situation to the pharmaceutical industry before regulation. This is not to say that there are no good cryptography products on the market. Most products seem to fall into the middle category: well-meaning but insecure. The term we use for bad cryptography products is "snake oil," which was the turn-of-the-century American term for quack medicine.

For example, here is a paragraph from the most recent snake-oil advertisement I received in e-mail: "Encryptor 4.0 uses a unique in-house developed incremental base shift algorithm. Warning Sign #1: Pseudo-mathematical gobbledygook. News B.

.pdf

Creepy Stalks Twitter, Foursquare, and Flickr Users by Aggregating GPS Data. Mo’ better to also detect “mobile” user-agent. Webmaster Level: Intermediate to Advanced Here’s a trending User-Agent detection misstep we hope to help you prevent: While it seems completely reasonable to key off the string “android” in the User-Agent and then redirect users to your mobile version, there’s a small catch...

Android tablets were just released! Similar to mobile, the User-Agent on Android tablets also contains “android,” yet tablet users usually prefer the full desktop version over the mobile equivalent. If your site matches “android” and then automatically redirects users, you may be forcing Android tablet users into a sub-optimal experience. As a solution for mobile sites, our Android engineers recommend to specifically detect “mobile” in the User-Agent string as well as “android.”

Let’s run through a few examples. You’ll notice that Android User-Agents have commonalities: For questions, please join our Android community in their developer forum. Written by Maile Ohye, Developer Programs Tech Lead. Security in 2020. There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something.

In the next 10 years, the traditional definition of IT security—­that it protects you from hackers, criminals, and other bad guys—­will undergo a radical shift. Instead of protecting you from the bad guys, it will increasingly protect businesses and their business models from you. Ten years ago, the big conceptual change in IT security was deperimeterization. There’s more deperimeterization today than there ever was. Today, two other conceptual changes matter. This trend will only increase. The second conceptual change comes from cloud computing: our increasing tendency to store our data elsewhere.

During the next 10 years, three new conceptual changes will emerge, two of which we can already see the beginnings of. Even on what are ostensibly general-purpose devices, we’re seeing more special-purpose applications. Top 10 voted Bruce Schneier Facts. OpenRCE.

Cloud

VRT. WSdicas_linux. WSUpSigF_Shell. ...::: WendelSecurity :::... Yarrow. SIGSYS. When a signal is sent, the operating system interrupts the target process's normal flow of execution to deliver the signal. Execution can be interrupted during any non-atomic instruction. If the process has previously registered a signal handler, that routine is executed. Otherwise, the default signal handler is executed. Embedded programs may find signals useful for interprocess communications, as the computational and memory footprint for signals is small. Sending signals[edit] Exceptions such as division by zero or a segmentation violation will generate signals (here, SIGFPE and SIGSEGV respectively, which both by default cause a core dump and a program exit).

Typing certain key combinations at the controlling terminal of a running process causes the system to send it certain signals: These default key combinations with modern operating systems can be changed with the stty command. Handling signals[edit] Risks[edit] Relationship with hardware exceptions[edit] POSIX signals[edit]

Intrusion Detection FAQ: What is covert channel and what are some examples?

Desenvolvimento Seguro

Forensics. Reverse Engineering.