« Back to home

Writing About Writing Secure Shell Scripts

I recently read this cautionary tale about shell scripts. https://www.linuxjournal.com/content/writing-secure-shell-scripts

It’s cautionary in two ways: it is intended to cause shell programmers caution, and I caution against you taking the article too seriously.

One of the biggest threats to the shell in memory was the Shellshock vulnerability. This wasn’t typically a direct threat to shell scripts, but one caused by a bug in a shell, and by other programs exposing parts of the shell to external input, often in unexpected and unlikely places.

Read more »

Introducing the Hitchcock

Posted on

Some trucks have testicles, mine has a Hitchcock.

The Hitchcock on the truck.

The Hitchcock on the truck.

Yes, that’s supposed to be the outline of Alfred Hitchcock.  It looks a lot like Harambe though…

Hitchcock in profile

If you want to make one, check out the Thingiverse thing here.  Download all files, open the zip up, and under “files” you’ll find an “stl” file.  Hop on over to https://www.hubs.com/, click “start manufacturing”, and upload that “stl” file.  I used regular PLA plastic and printed in white to try to avoid any discoloration due to sunlight inevitably breaking this thing down.  If you want a recommendation for a specific hub to use over there, these guys printed this Hitchcock, and I’m sure they’ll do a great job for you too.

Read more »

Confidentiality and Integrity vs Availability

In computer security, there are three main axes for consideration - confidentiality, integrity, and availability (CIA).  These are commonly thought of as things you desire out of a secure system.  You want your communications to only be available to the intended agents, you want them to remain unchanged except when you intend them to change, and you want them to be available when you need them.  Preferably, you want your communications to have all of those properties.

Read more »

Early Virus Total Catch

Posted on

When you aren’t quite first into Virus Total, but not far off, and the malware author who hard-coded an IP address is still using that IP :-)

Virus Total says:

First Submission  2018-04-03 00:00:53

Last Submission  2018-04-03 22:07:38

Last Analysis  2018-04-03 22:07:38

Hopefully the IP address owner got a dozen emails already, they’re a cloud provider.

Read more »

UK 2017 Odds and Ends

Posted on

Sarah and I are in line to get on our Norwegian Air flight home. I guess it’s time to wrap these posts up.

Some things to mention.

There’s lots of free WiFi. Still, having data access over the air is amazing. Google Project Fi gave me data access everywhere for the same price I pay at home. Phone calls are a bit expensive, but who makes those? WiFi calling is normal and texts are free.

Read more »

Cork and the Cliffs

Posted on

We took some side trips from Dublin - one to Cork/Blarney castle/Midleton, and one to the Cliffs of Moher with a few extra stops in there…

It’s easy to take the train from Dublin to Cork, be and from there you take the Cork bus to Blarney castle and Midleton (Jameson’s major distillery). The train leaves from Dublin Heuston station (pronounced like the Houston in Texas), and takes a couple hours. Buy tickets online, print them on the machine at the station, and hop on!  Electric outlets and wifi are provided.

Read more »

Dubsteppin Dublin

Posted on

A sign at Dublin airport showing a man being blown away, and instructing pilots to use minimum power

Watch Yourself at Dublin Airport

Land at Dublin airport, take a trip through passport control, buy a Leap card at the tourist desk inside, put €20 on it, step outside to the bus stop, hop on the Airlink 757 bus, get a tour of downtown from the top of a double decker bus, step off 30 minutes later in downtown Dublin.

Read more »