Suramya's Blog : Welcome to my crazy life…

September 21, 2005

How to Investigate Intermittent Problems

Filed under: Computer Tips,News/Articles,Tech Related — Suramya @ 9:14 PM

A really really good post by James Bach on how to investigate Intermittent Problems. Any person who does product testing should read this. Even developers/programmers need to read this as this will make it easier to find and fix bugs.

Brief extract from this post:

Some Principles of Intermittent Problems:

  • Be comforted: the cause is probably not evil spirits.
  • If it happened once, it will probably happen again
  • If a bug goes away without being fixed, it probably didn’t go away for good.
  • Be wary of any fix made to an intermittent bug. By definition, a fixed bug and an unfixed intermittent bug are indistinguishable over some period of time and/or input space.


Some General Suggestions for Investigating Intermittent Problems:

  • Recheck your most basic assumptions: are you using the computer you think you are using? are you testing what you think you are testing? are you observing what you think you are observing?
  • Eyewitness reports leave out a lot of potentially vital information. So listen, but DO NOT BECOME ATTACHED to the claims people make.
  • If someone tells you what the problem can’t possibly be, consider putting extra attention into those possibilities.

Original Post:
How to Investigate Intermittent Problems

– Suramya

September 20, 2005

thebroken dot organization

Filed under: Tech Related — Suramya @ 1:32 PM

Found this interesting site yesterday while surfing the web, it is ‘computer show’ that is a bit different than the average computer show. It goes a bit into the gray area and talks about hacking, social engineering, making exploding laptops etc. Not very technical but interesting anyways.

So far they have released three episodes but more are on the way…

Check it out:
thebroken dot organization

– Suramya

September 17, 2005

Ver 0.3 of the CollageGen script released

Filed under: Software Releases,Tech Related,Website Updates — Suramya @ 3:14 AM

I have just Released CollageGen, Version 0.3. Incase you are wondering, CollegeGen is an application that uses the Yahoo search API to create a collage for any search term entered by the user.

Changes made in this release:

  • The backend script was rewritten from scratch to make the collage generation faster and more efficient.
  • Redesigned the CollageGen access website
  • Threading support was removed from the backend

Check it out and let me know what you think.

Thanks,
Suramya

September 13, 2005

Snooping on Text by Listening to the Keyboard

Filed under: Computer Related,My Thoughts,Tech Related — Suramya @ 8:25 PM

According to Bruce Schneier’s blog a group of researcher’s from Berkeley have developed a process that lets them identify the keys being typed by analyzing an audio recording of someone typing at the computer for about 15 mins.

There was some research done on this earlier but their method required specific training tapes where the system knew what keys were pressed and when to configure the listener before it was able to accurately deciper the input. In this case the training tape is an actual recording of a target.

This brings an interesting possibility for hackers/crackers to steal passwords/information by setting up hidden mic’s etc.

Saw a technique somewhat like this being used in a TV show called ‘MI-6″ (Or was it MI-5? It was 3 am… ) In it one of the spies gives a special cufflink to the target and gets him to type her resume out. As the spies knew what was on the resume they were able to get a readout of each key (They didn’t explain what readout’s they were taking in too much detail) and once they got that they were able to see what ever the target typed on the computer in realtime as long as he was wearing his cufflink. Neat eh?

But before you start panicking, remember the bad guy’s still have to either get physical access to your system and/or the area around your system in order to bug it and you know the law: “Physical access is root access”.

So to lower the risk of this attack all you have to do is follow the same basic rules you have been following about not granting unknown people access to your workplace and keep an eye out for people carying video camera’s and mic’s.

To make the risk go away completely play loud music to drown out the typing sound when working on sensitive data.

Original Source:
Schneier on Security: Snooping on Text by Listening to the Keyboard

Link to the Paper: Snooping on Text by Listening to the Keyboard (PDF File)

– Suramya

September 12, 2005

Setting up a SOCKS Proxy using SSH

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 8:13 PM

This article explains how we can setup a SOCKs proxy via SSH which lets you surf the internet securely from unsecure locations.

Excerpt:

Open PuTTY (see the list of requirements above for a URL). You should be greeted with a configuration screen. First, you will enter the hostname or IP address of the SSH server. Type in a name for your connection settings in the box below “Saved Sessions”, and click the Save button.

Now you need to look at the tree of options to the left; expand the SSH tree, and select “Tunnels”. Enter 4567 (or any port number above 1024) in the Source Port area, and click the Dynamic radio button to select it. Leave the Destination field blank, and click “Add”.

Now go back to the Session tree (very top of the left section), and save again.

You will be prompted to enter a username, which is the username of your shell account. Type that in, hit enter, and then type in your password when it prompts you.

Original Article:
Security Engine: Secure surfing SSH

Programming PHP with Security in Mind

Filed under: Computer Security,Tech Related — Suramya @ 7:37 PM

Interesting article about how to write PHP code securely. A bit old but it still has a lot of good info and tips.

Article Link:
Programming PHP with Security in Mind

September 5, 2005

Restricting SSH to allow users to only run allowed commands

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 7:54 AM

To restrict access to a server by allowing an authorized user to only run a specific command add an authorized_keys file entry that looks like (this is all in one line one line)

from=”202.41.95.13″,command=”rsync -aCz –server –sender $SRCDIR .”,
no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty
ssh-dss
AAAAB3NzaC1kc3M

Here you must put the appropriate source directory in $SRCDIR.

The authorized key file can be put in a dummy users directory. This dummy user should have appropriate read/write permissions for the directory in question.

As an alternative you can use a configuration file “–config=$FILE” in place of $SRCDIR.

Once this is done, the owner of the SSH private key associated with the public-key (which is the bit that starts ssh-dss AAA….) can connect to the ssh server and start the above command and *only* the above command.

– Suramya

PS: Thanks to Kapil from the Linux Gazette Answer Gang for the above tip.

September 1, 2005

Learn two ways to disable Internet Explorer

Filed under: Computer Security,Security Tutorials,Tech Related — Suramya @ 11:04 PM

Techrepublic has a really nice article that tells you how to disable IE. Keep in mind that this just disables IE not remove it.

Article Extract:

The easiest way to remove users’ ability to browse with IE is to add a bogus proxy server to IE’s Internet Settings.

Follow these steps:

1. In IE, go to Tools | Internet Options.
2. On the Connections tab, click the LAN Settings button.
3. In the resulting dialog box, select the following check box in the Proxy Server section: Use a Proxy Server For Your LAN (These Settings Will Not Apply To Dial-up Or VPN Connections).
4. Enter 0.0.0.0 in the Address text box.
5. Enter 80 in the Port text box, and click OK.

Please note that adding a bogus proxy server to your Internet settings won’t affect Automatic Windows Update from connecting and updating your operating system.

You can also restrict Internet settings via Group Policy. Follow these steps:

1. On your domain controller, right-click the organizational unit that contains your domain users, and select Properties.
2. On the Group Policy tab, click Edit.
3. Expand User Configuration to set restrictions on a per-user basis.
4. Expand Windows Settings, and expand Internet Explorer Maintenance.
5. Select Connection, and double-click Proxy Settings.
6. Select the Enable Proxy Settings check box, add 0.0.0.0 to the HTTP entry, and click OK.
7. Expand Administrative Templates, and expand Windows Components.
8. Select Internet Explorer, and double-click Disable Changing Proxy Settings.
9. Select Enabled, and click OK.

Article Source :
Learn two ways to disable Internet Explorer

– Suramya

August 7, 2005

10 Immutable Laws of Security

Filed under: Computer Security,Tech Related — Suramya @ 12:37 AM

Found these on the Microsoft TechNet website. Found them to be true so decided to share them with you all:

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore
Law : If a bad guy can alter the operating system on your computer, it’s not your computer anymore
Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore
Law #4: If you allow a bad guy to upload programs to your website, it’s not your website any more
Law #5: Weak passwords trump strong security
Law #6: A computer is only as secure as the administrator is trustworthy
Law #7: Encrypted data is only as secure as the decryption key
Law #8: An out of date virus scanner is only marginally better than no virus scanner at all
Law #9: Absolute anonymity isn’t practical, in real life or on the Web
Law #10: Technology is not a panacea

I agree with all of them and have found them to be true at various times…

Original located at: MicroSoft TechNet

– Suramya

June 15, 2005

The Linux iPod

Filed under: Tech Related — Suramya @ 3:05 PM

Now this is really cool, the cool people at ipodlinux.org have figured out how to install Linux on an iPod. Once you install Linux on the iPod it opens up a whole lot of goodies up like the ability to record voice without needing extra hardware, more games etc.

For me the biggest advantage would be the recording feature. The best part however is that we can easilty revert back to the default iPod OS(?) by doing a softreset of the iPod.

Unfortunately the mini is not that well supported yet 🙁 so I guess I will have to wait till they get it to work on the Mini. I will definetly be keeping my eye on this one.:)

Complete Story: MacWorld

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress