Category: "IT Security"

About the IT Security category

  22:30, by Hagai Bar-El   , 57 words
Categories: IT Security

The IT Security category contains essays that discuss security aspects of corporate and personal information systems. Also included are personal and corporate security policy issues, as well as operations security. Examples for topics that fall into this category are: malware detection, network firewalls and attacks prevention, deployment of encryption technologies, protection of privacy in deployed systems, etc.

Pages: 1 3 4 5

  2019-09-07

On protecting yourself against MITM in SSH

  21:40, by Hagai Bar-El   , 1081 words
Categories: IT Security, Day-to-Day Security Advice
SSH is one of the best security protocols out there. It is used by anyone remotely logging into servers, as well as for secure connection to Git servers, and for secure file transfers via SFTP. One of the key promises of SSH is protection against active… more »

  2019-08-31

Using Tor to protect against certificate injection by Hotspots

  15:21, by Hagai Bar-El   , 667 words
Categories: IT Security, Day-to-Day Security Advice
Tor is typically used to attain anonymity and preserve privacy online. This is by far the most common and appealing use for it. Most people without such concerns are not likely to ever install a Tor browser on their workstations, and it's a pity; Tor… more »

  2015-11-30

The status of Truecrypt (2nd edition)

  18:22, by Hagai Bar-El   , 419 words
Categories: IT Security
It has been a while since Truecrypt was discontinued. While it still works on most platforms, including new Windows machines (except for the full-disk-encryption on some of them), and while there is still no evidence to indicate that it is insecure, users of Truecrypt find the situation bothersome; and for a good reason. By now it seems obvious than an alternative has to be found. more »

  2015-01-05

Shodan makes us all more secure

  05:46, by Hagai Bar-El   , 792 words
Categories: IT Security, Security Policies
Shodan is a search engine for computers.It allows to search for hosts on the Internet not by the text they serve but by their technical properties as they reflect in responses to queries. So is Shodan bad? Not at all. These are exactly the forces that make us all more secure. more »

  2014-10-11

Snapchat leak -- who is to blame?

  10:52, by Hagai Bar-El   , 242 words
Categories: IT Security, Security Engineering
Snapchat is in the headlines again for allegedly leaking out nude photos of users. They strictly deny that there was any breach of their servers, and blame third party applications for leaking this data. This might be the case, but it is not enough to take them off the hook, especially given that their product is mostly about ​confidence​. more »

  2014-07-24

TrueCrypt alternatives?

  22:23, by Hagai Bar-El   , 660 words
Categories: IT Security, Products
It has been a while since the announcement on the demise of TrueCrypt, and a solution for all those people that grew used to relying on it, in the shape of a complete replacement is not yet evident. more »

  2014-05-30

The status of TrueCrypt

  07:40, by Hagai Bar-El   , 564 words
Categories: IT Security, Products
I wish I had known where TrueCrypt stands now, but I don't. I follow TrueCrypt and regularly endorse it  ever since I discovered it and wrote this post nine years ago. TrueCrypt was, and may still be, the most sensible and presumably-secure volume and… more »

1 3 4 5