Home Subscribe

Security

The protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide

Page 1 of 1

Cloudflare Hijacked my Ghost(Pro) Domain

Cloudflare will gladly delegate any of your domains that are pointing to any SaaS provider hosted on their platform. In this article I show how to take back control

Christopher Demicoli Christopher Demicoli on Security, Infrastructure Posted 4 years ago
Posted 4 years ago on Security, Infrastructure

Analyzing Data from a Public-Facing Honeypot

What happens if you setup a badly password protected server on the public internet without telling no one? How much time would it take before a botnet would try to hijack it?

Christopher Demicoli Christopher Demicoli on Security, Infrastructure, Malware Posted 5 years ago
Posted 5 years ago on Security, Infrastructure, Malware

Implications of Privacy and Encryption on Smart Devices

In the recent past, there have been numerous debates on the privacy of personal data in devices like smartphones and laptops as well as on online sites like Facebook and Google.

Christopher Demicoli Christopher Demicoli on Privacy, Security, Encryption Posted 5 years ago
Posted 5 years ago on Privacy, Security, Encryption

Bypassing Active Directory Group Policy

Networks that run with users as local administrators have no way to enforce policies on their organization's computers. In this post, I show how and why.

Christopher Demicoli Christopher Demicoli on Security, Windows, Infrastructure Posted 5 years ago
Posted 5 years ago on Security, Windows, Infrastructure

Never accept an MDM policy on your personal phone

With BYOD, companies are more than ever keen on protecting their data. MDM tools, like Google Apps, do more than that; they invade your privacy.

Christopher Demicoli Christopher Demicoli on Security, Infrastructure Posted 5 years ago
Posted 5 years ago on Security, Infrastructure

Inspecting the Meltdown and Spectre CPU Vulnerabilities

A CPU predicts you will walk into a bar, you do not. Your credit card has been stolen. The drinks are 30% more expensive. (Oh, and the bartender was insider trading)

Christopher Demicoli Christopher Demicoli on Security, Hardware Posted 5 years ago
Posted 5 years ago on Security, Hardware

Using Subresource Integrity (SRI) with Public CDNs

Public CDNs are awesome; they are fast and free, but it means that third parties have control of stuff that run on your site. What if the CDN is compromised?

Christopher Demicoli Christopher Demicoli on Security, Programming, Software Development Posted 7 years ago
Posted 7 years ago on Security, Programming, Software Development

On HSTS

What is HSTS? How does it protect your web host from SSL Stripping Man In The Middle attacks? How can you implement it?

Christopher Demicoli Christopher Demicoli on Security, Infrastructure, Cryptography Posted 7 years ago
Posted 7 years ago on Security, Infrastructure, Cryptography

Enabling Windows' DNS Server to Validate DNSSEC

DNSSEC is a suite of specifications for securing DNS. How do you enable your Windows DNS Server to Validate DNSSEC?

Christopher Demicoli Christopher Demicoli on DNS, Networking, Infrastructure, Security, Windows Posted 7 years ago
Posted 7 years ago on DNS, Networking, Infrastructure, Security, Windows

Introduction to the Diffie-Hellman Key Exchange

How can Alice and Bob agree on a secret, without having any prior knowledge of each other, over the Internet and with Eve listening in on the conversation?

Christopher Demicoli Christopher Demicoli on Security, Cryptography Posted 7 years ago
Posted 7 years ago on Security, Cryptography

Petya Ransomware Defeated

Petya is a new variant of ransomware, first seen in March 2016 that encrypts your entire hard drive. Learn how to reverse it and get your data back.

Christopher Demicoli Christopher Demicoli on Ransomware, Encrypting Ransomware, Malware, Security Posted 7 years ago
Posted 7 years ago on Ransomware, Encrypting Ransomware, Malware, Security

Protecting against Encrypting Ransomware

Encrypting Ransomware is one of the biggest threats in 2016, both for personal computers, your corporate IT and enterprise infrastructure. How can you mitigate and minimize your attack vectors?

Christopher Demicoli Christopher Demicoli on Ransomware, Encrypting Ransomware, Backup, Malware, Security Posted 7 years ago
Posted 7 years ago on Ransomware, Encrypting Ransomware, Backup, Malware, Security

Today is World Backup Day; don't be an April Fool!

March 31st is World Backup Day. Even though, everyday should be World Backup day, today we discuss some important backing up techniques and tips to hopefully raise some awareness

Christopher Demicoli Christopher Demicoli on Backup, Security Posted 7 years ago
Posted 7 years ago on Backup, Security
Page 1 of 1
blog.cdemi.io