Advances in Scripting Security and Protection in Windows 10 and PowerShell V5
In the last several releases of Windows, we’ve been working hard to make the platform much more powerful for administrators, developers, and power users alike. PowerShell is an incredibly useful and powerful language for managing Windows domains. Unfor…
SSH Key: Ed25519 vs RSA
A lot of people recommend using Ed25519 instead of RSA keys for SSH.
The introduction page of Ed25519 (http://ed25519.cr.yp.to/) says:
[..] breaking it has similar difficulty to breaking [..] RSA with ~3000-bit keys [..]
So speaking only…
NitlovePOS: Another New POS Malware
There has been a proliferation
of malware specifically designed to extract payment card
information from Point-of-Sale (POS) systems over the last two years.
In 2015, there have already been a variety of new POS malware
identified including a…
NitlovePOS: Another New POS Malware
There has been a proliferation
of malware specifically designed to extract payment card
information from Point-of-Sale (POS) systems over the last two years.
In 2015, there have already been a variety of new POS malware
identified including a…
Ensure that a file can only be decrypted after a specific date
Are there any cryptographic schemes/protocols that would allow me to encrypt a file, make it publicly available, but ensure that it can only be decrypted after specific date?
I assume it would be almost impossible without a trusted author…
Logging all traffic crossing SSH proxy
Is there a way to log SSH sessions proxied through a machine (User-> SSH Proxy -> Server (with SSH)) without modifying the SSH daemon on the proxy? I need to log all the commands as well as responses exchanged between the User and the Serv…
How is TSC (TKIP sequence counter) calculated, in WPA?
I’m reading about 802.11, from IEEE’s PDF, from page 1191, and in particularly I’m reading about TKIP. To decrypt and encrypt, you use a TSC (TKIP Sequence Counter) as you can see in these images:
How, and from what, is the TSC calcu…
Managing multiple SSH private keys for a team
I have a medium-sized team (~10 people, but we expect to grow) that manages a set of EC2 servers on AWS (currently a few dozens, but this is also expected to grow).
As EC2 requires you to have an AWS generated private SSH key, without a …
In Oauth what is the benefit of the access token being opaque
Why was the decision taken that the Client doesn’t need to be able to parse the access token?
It seems to me that if the token included, in addition to the current fields, a client_id and a user_id, it would make life much simpler, prevent…