Categories
Computer Tech

Mikrotik guest VLAN with Cap AC

It’s past time to create additional VLANs on my home network for IoT and guests, so I decided to take the plunge and see what configuration was required on my Mikrotik AP. The basic physical network topology is: internet <—> firewall <—> L2 switches <—> CapAC <—> users As I’m not using an L3 switch […]

Categories
Computer Tech

Centos bails

Wow. What a week. I’m almost not sure to start but let’s give this a go. Red Hat’s had a pretty hard week convincing Centos users that their announcement Tues (15th Dec) deprecating Centos 8 (and Centos downstream in general), is A Good Thing(tm). How did this come about? Centos is one of the most […]

Categories
Computer Tech

The trouble with SPAM

The queries I’ve been getting lately requesting checks on whether a particular email is spam or not, has been enlightening. It’s clear there’s a problem. Somewhere. Email users are not seeing the “wood for the trees” no matter the fact that spam has been an entrenched part of our lives for a couple of decades […]

Categories
Computer Tech Security

SSL/TLS Certificate lifetime

The SSL/TLS certificate revocation system (CRL and OCSP) is broken. This is a fact known for a long time by the whole certificate industry. Long-lived certificates that have issues (eg. a certificate that was fraudulently issued), hang around on the Internet for extended periods (currently up to 3 years) potentially causing security and authenticity issues. […]

Categories
Computer Tech Security

Browser Security

Browser technology and security events always make for interesting reading especially due to the fact that we do the majority of our online work these days through browsers, be it general web surfing, accessing enterprise apps or managing systems and devices. Browser features and security are therefore critical – this shouldn’t even need to be […]

Categories
Cloud Computer Tech Security Storage

Cloud Services and Availability

From the way that Cloud vendors promote their wares and how apologists fawn over these services, one would think that Cloud was the be all and end all of computing. The fact is that we’ve been here before and Cloud is just a more advanced form of central or mainframe computing from the 60s and […]

Categories
Computer Tech Health Security

The Apple/Google contact tracing API

Apple and Google (yes generally understood to be “sworn enemies” 😀 ) jointly developed an API to be used by contact tracing apps and released said API late in May 2020. Apple and Google’s API follows a decentralized approach, which means that every operation that might involve privacy is carried out on users’ phones, rather […]

Categories
Computer Tech Mobile Security

Are you BIASed?

A new vulnerability in the authentication component of the Bluetooth wireless protocol has been uncovered by a group of researchers. The issue is not relating to a bug but rather the specification itself. “The Bluetooth standard includes both a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other using […]

Categories
Computer Tech Storage

NAS and SMR collide

A ‘brief’ primer on NAS TL;DR move to the next section if you find this boring … NAS, being the (mostly) cheaper cousin to SANs, is used pervasively everywhere from SOHO environments to large corporates. Netapp (Network Appliance) basically invented the category in the 90’s with their F-series of units combining SMB and NFS access, […]

Categories
Computer Tech Security

RDP – the gift that keeps on giving

It’s long been known (at least in security circles) that the RDP protocol, as well as client and server implementations, are horribly broken. While a BlueKeep (the most recent RDP vulnerability) worm has yet to surface, brute-force password attacks on RDP services are a dime a dozen and occurring at a rapid rate. PoC code […]

Categories
Computer Tech Security

The great web developer con

Another day, another dodgy web developer story. The premise: We would like to offer you a website design for X amount. But to do so, we need to transfer your domain to us. This tale is a pretty old one but it appears to be flourishing – the lure of a good once-off price for […]

Categories
Computer Tech Security

DMARC: optimising email delivery

Email is a fickle thing … There are a huge amount of dependencies involved in what seems like a small task – sending an email. What started out as a simple method of exchanging messages has morphed over the years into a cobbled-together monster as needs changed and especially businesses required a more robust and […]

%d bloggers like this:
x Logo: Shield Security
This Site Is Protected By
Shield Security