3 weeks ago, I posted a rant about my frustration/concern related with crypto tools, more specifically the lack of tools to implement crypto-based protection for files on OSX, in a point-&-click user-friendly way. I listed my personal Read more
First of all, Happy New Year to everyone! I hope 2016 will be a fantastic and healthy year, filled with fun, joy, energy, and lots of pleasant surprises.
I remember when all of my data would fit on Read more
Good morning,
Since doing live-blogging seemed to work out pretty well yesterday, I’ll do the same thing again today. Please join in for day 3 at BlackHat Europe 2012, in a cloudy and rainy Amsterdam.
The first talk Read more
Welcome back friends, at day 2 of BlackHat Europe 2012, held in the Grand Hotel Krasnapolsky in the wonderful city of Amsterdam.
Today, I’m going to do things slightly different. I will try to post write-ups immediately after Read more
In an older blog post on Certificate Authorities, I have provided some information about the process to generate Exchange 2007 certificates. This process has slightly changed in Exchange 2010, and Johan Delimon (pro-exchange.be) has written an excellent article Read more
I have noticed some blog performance issues over the last couple of days, so I have decided to make some system changes on the web and database servers that are hosting this blog.
These changes are in place, but Read more
In one of my earlier posts, I have talked about setting up a Windows 2008 based Certificate Authority/PKI. Once your Windows 2008 CA setup is in place and configured, you can go ahead and starting issuing certificates. But Read more
Basic steps :
ike-scan is a great tool to audit VPN/IPSec implementations. This tool, which runs under Lunix, Unix, MacOS and Windows, can be found at www.nta-monitor.com/tools/ike-scan/ (Latest version at time of writing is 1.9). My Nessus ike-scan NASL wrapper may Read more
The following procedure explains how to set up a Juniper ScreenOS based firewall to accept Netscreen Remote Client VPN connections and authenticate users using Active Directory (Radius via Windows 2003 IAS or Windows 2008 NPS).
We’ll assume that all Read more