Suramya's Blog : Welcome to my crazy life…

July 31, 2006

ScatterChat: A secure instant messaging client.

Filed under: Computer Security,My Thoughts,Security Tools,Tech Related — Suramya @ 5:15 PM

Now this is a cool software. It allows a user to encrypt all communications using end-to-end encryption and routing based on Tor (Tor Overview)

The program is a ‘friendly’ fork of the Gaim project. In case you are wondering what a fork is, a project fork or branch happens when a developer (or a group of them) takes a copy of source code from one software package and starts to independently develop a new package.

The software itself is pretty cool, but its likely to come under heavy fire from various govt and ‘spy’ agencies because the design of the software makes it really hard for anyone to eavesdrop on anyone. They will claim that this will allow terrorists and child pornographers to communicate anonymously.

It might be used by a terrorist but then so can a car (used as a getaway vehicle), a cell phone (used as a communication tool), watch (to sync timed attacks)… does this mean all of them should be banned as well? Any technology developed can be used for good as well as bad purposes.. starting with fire all the way upto a nuclear reaction… now that the genie is out of the bottle you can’t stuff it back in.

I think it will be useful for all sorts of people including:

Spies, to let them communicate with the home office, report anonymously
Corporate whistle blowers: they can report wrongs/broken laws without getting into trouble
People behind the great firewall of china, where you can be arrested for disagreeing with the government.

Check out the software: ScatterChat

Thanks to Schneier on Security for the link.

– Suramya

PS: I haven’t tried the software yet so don’t know how stable it is. Though I will be installing it shortly so will let you know how it goes.

March 9, 2006

New Biometrics scanner released

Filed under: Computer Hardware,Computer Security,Tech Related — Suramya @ 11:01 PM

This is an interesting new biometrics scanner that uses the layout of the veins in the user’s palm to authenticate them. Apparently its more reliable than fingerprints and safer. Couldn’t find any pricing information but I bet they are expensive right now. Hopefully the price will go down a lot so that I can afford to get one to play with.

Synopsis:

Fujitsu Computer Products of America, Inc. on Wednesday announced the global launch of its PalmSecure biometric authentication system. The contactless system identifies users by examining the layout of the veins in the palms of their hands.

The PalmSecure device uses a near-infrared beam, similar to that used by television remote controls, to map the layout of veins carrying oxygen-depleted blood back to the heart. According to Joel Hagberg, vice president of marketing and business development for Fujitsu, those vein patterns are unique in every person — even more so than fingerprints or DNA.

Complete Story: For security, Fujitsu talks to the hand – Computerworld

Thanks,
Suramya

February 10, 2006

Police blotter: Patriot Act e-mail spying approved

Filed under: Computer Security,My Thoughts,News/Articles,Tech Related — Suramya @ 12:27 PM

Another not so useful move by the US govt in the ‘war’ against terrorism. My cooking can be described as a lethal weapon so I guess they need to check my email to make sure I am not a terrorist.

Abstract:

A federal judge recently approved a prosecutors’ Patriot Act request for e-mail surveillance without any evidence of wrongdoing by the target. The Patriot Act’s amendments authorize that type of easily obtainable surveillance of e-mail. All that’s required is that prosecutors claim the surveillance could conceivably be “relevant” to an investigation.

Complete Article: Patriot Act e-mail spying approved

– Suramya

December 7, 2005

20 ways to Secure your Apache Configuration

Filed under: Security Tutorials,Tech Related — Suramya @ 11:36 PM

Finally a decent guide on how to secure an Apache installation. I am not maintaining any apache server’s right now but if I was this would have been a great help.

Complete Article: 20 ways to Secure your Apache Configuration

– Suramya

November 9, 2005

Building extra secure Web applications

Filed under: Security Tutorials,Tech Related — Suramya @ 4:30 PM

Interesting article from IBM that offers a new security design framework that covers two common types of vulnerability: action tampering and parameter manipulation (also known as data tampering).

Check it out: Build extra secure Web applications

– Suramya

November 8, 2005

Reducing browser privileges for a user

Filed under: Security Tutorials,Tech Related — Suramya @ 10:31 PM

This article shows a simple approach of reducing privileges for Internet-facing applications on such as IE, Firefox, IM and email clients when the user must operate as a Windows administrator.

Reducing browser privileges

November 2, 2005

Windows XP services that can be disabled

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 9:53 PM

One of the most effective ways to secure a Windows workstation is to turn off unnecessary services. This reference sheet lists the Windows XP SP 2 services, describes each service’s function, specifies whether you can safely disable the service, and outlines the ramifications of disabling the service.

Good Information. Check it out.

Downloading Windows XP services that can be disabled – TechRepublic

Windows XP services that can be disabled

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 9:51 PM

One of the most effective ways to secure a Windows workstation is to turn off unnecessary services. This reference sheet lists the Windows XP SP 2 services, describes each service’s function, specifies whether you can safely disable the service, and outlines the ramifications of disabling the service.

Good Information. Check it out.

Downloading Windows XP services that can be disabled – TechRepublic

Network monitoring with Cacti

Filed under: Computer Software,Security Tools,Tech Related — Suramya @ 9:04 PM

Interesting software to try out for network monitoring. Hopefully it will be simpler to use/setup than some of the other software I have tried earlier.

Network monitoring with Cacti

October 11, 2005

Protecting Files at Home Using Encrypted Containers

Filed under: Security Tools,Security Tutorials,Tech Related — Suramya @ 9:05 PM

This is an awesome article on how to create Encrypted Containers that makes it easy to create encrypted backup locations that can copied to other systems without hassle and are simple to use.

Protecting Files at Home Using Encrypted Containers

« Newer PostsOlder Posts »

Powered by WordPress