Suramya's Blog : Welcome to my crazy life…

February 10, 2006

Police blotter: Patriot Act e-mail spying approved

Filed under: Computer Security,My Thoughts,News/Articles,Tech Related — Suramya @ 12:27 PM

Another not so useful move by the US govt in the ‘war’ against terrorism. My cooking can be described as a lethal weapon so I guess they need to check my email to make sure I am not a terrorist.

Abstract:

A federal judge recently approved a prosecutors’ Patriot Act request for e-mail surveillance without any evidence of wrongdoing by the target. The Patriot Act’s amendments authorize that type of easily obtainable surveillance of e-mail. All that’s required is that prosecutors claim the surveillance could conceivably be “relevant” to an investigation.

Complete Article: Patriot Act e-mail spying approved

– Suramya

December 7, 2005

20 ways to Secure your Apache Configuration

Filed under: Security Tutorials,Tech Related — Suramya @ 11:36 PM

Finally a decent guide on how to secure an Apache installation. I am not maintaining any apache server’s right now but if I was this would have been a great help.

Complete Article: 20 ways to Secure your Apache Configuration

– Suramya

November 9, 2005

Building extra secure Web applications

Filed under: Security Tutorials,Tech Related — Suramya @ 4:30 PM

Interesting article from IBM that offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).

Check it out: Build extra secure Web applications

– Suramya

November 8, 2005

Reducing browser privileges for a user

Filed under: Security Tutorials,Tech Related — Suramya @ 10:31 PM

This article shows a simple approach of reducing privileges for Internet-facing applications on such as IE, Firefox, IM and email clients when the user must operate as a Windows administrator.

Reducing browser privileges

November 2, 2005

Windows XP services that can be disabled

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 9:53 PM

One of the most effective ways to secure a Windows workstation is to turn off unnecessary services. This reference sheet lists the Windows XP SP 2 services, describes each service’s function, specifies whether you can safely disable the service, and outlines the ramifications of disabling the service.

Good Information. Check it out.

Downloading Windows XP services that can be disabled – TechRepublic

Windows XP services that can be disabled

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 9:51 PM

One of the most effective ways to secure a Windows workstation is to turn off unnecessary services. This reference sheet lists the Windows XP SP 2 services, describes each service’s function, specifies whether you can safely disable the service, and outlines the ramifications of disabling the service.

Good Information. Check it out.

Downloading Windows XP services that can be disabled – TechRepublic

Network monitoring with Cacti

Filed under: Computer Software,Security Tools,Tech Related — Suramya @ 9:04 PM

Interesting software to try out for network monitoring. Hopefully it will be simpler to use/setup than some of the other software I have tried earlier.

Network monitoring with Cacti

October 11, 2005

Protecting Files at Home Using Encrypted Containers

Filed under: Security Tools,Security Tutorials,Tech Related — Suramya @ 9:05 PM

This is an awesome article on how to create Encrypted Containers that makes it easy to create encrypted backup locations that can copied to other systems without hassle and are simple to use.

Protecting Files at Home Using Encrypted Containers

September 27, 2005

A Lesson in Encryption

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 2:15 PM

A good trilogy of articles by Peter van der Linden on encryption.

Part 1, describes how public key encryption works and where to get the GnuPG encryption software. Part 2 walks through some examples of file encryption/decryption, and Part 3 explains how to send and read encrypted e-mail

Lesson in Encryption, Part 1
Lesson in Encryption, Part 2
Lesson in Encryption, Part 3

– Suramya

September 22, 2005

Linux LDAP authentication tutorial

Filed under: Security Tutorials,Tech Related,Tutorials — Suramya @ 2:46 PM

Tutorial on how to setup LDAP on Linux. Looks interesting, might try it out on my spare machine when I go home next week.

Article Link: Linux LDAP authentication

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress