The Golden Braid

Weaving Wonderful Worlds

Weeky Brain, Part IV

Sorry it has been a while. I was out of town last weekend and received a last minute rush project at work…you know how the story goes.

Pushing ahead. Here is where I am this week:

I got the dev. server up and running. I had to brush up a bit on my subnetting, but all turned out well after that tiny bit of frustration. In case you're curious how the config turned out; I did wind up running two daisy chained NAT/SPS routers behind a Hamachi VPN with software firewalls on all clients. You may call it overkill, I will continue to call it a fun excercise in paranoia. The next step is implementing a traveling key-drive encryption set up which will eventually replace all but on-site admin logins once the site goes live.

I did choose XOOPS for a CMS manager, but I fear I will not have the time to sit down with it in the next few weeks. It does look promising due to its native technologies, but I can't say I've done much more than read the basics.

I need to do some fact finding on Squids (the cache servers, not the sea creatures). Which reminds me, I did get to pet some sharks and sting-rays while I was on holiday…that was a riot.


June 18, 2006 Posted by | CMS, Daily thoughts, Security | Leave a comment

Exploring XML Encryption

Two part series from IBM on implementing XML encryption per the w3c.

read more | digg story

June 4, 2006 Posted by | encryption, Security | Leave a comment

UK Government Seeks Power to Demand Encryption Keys

A new law proposes to allow UK police to request the master key for encrypted files. Anyone who refuses to comply with the request can be imprisoned for up to two years. In a terrorism investigation, that penalty can be increased up to five years of jail time.

read more | digg story

What if the encrypted message contained a dialogue on over-throwing the prime minister? Boy would those guys faces be red…I'm sure the world would have a good chortle then. I have a better idea, we should throw the lot of them in jail for using a door on the privy. The "powers-that-be" need to watch you take a wee, it's one of those national security things.

Go back to bed citizens!

May 21, 2006 Posted by | encryption, Privacy, Security | Leave a comment

Self-Study Course in Block Cipher Cryptanalysis

This is an amazing course put together by Bruce Schneier. Everything you need to prep for that job in CTU; and it's free, of course.

read more | digg story

May 20, 2006 Posted by | Privacy, Security | Leave a comment

DOJ files to block AT&T suit “under cover of night”

The Dept. of Justice went ahead and filed to dismiss the class-action wiretap/data-mine suit against AT&T, claiming it is protecting state secrets.

read more | digg story

May 14, 2006 Posted by | Politics, Privacy, Security | Leave a comment

Hamachi VPN as a service on any version of Windows

Here’s a good article on how to install and configure Hamachi to run as a service that automatically connects on Windows 2000, XP, and 2003. It lays out all the necessary steps in one place.

read more | digg story

February 19, 2006 Posted by | Security, technology | Leave a comment

Houston Police Chief Wants To Put Surveillance Cameras In Your Private Home

“I know a lot of people are concerned about Big Brother, but my response to that is, if you are not doing anything wrong, why should you worry about it?” – Police Chief Harold Hurtt

read more | digg story

February 19, 2006 Posted by | Politics, Privacy, Security | Leave a comment

Famous Unsolved Codes and Ciphers

This is an unofficial list of well-known unsolved codes and ciphers. A couple of the better-known unsolved ancient historical scripts are also thrown in, since they tend to come up during any discussion of unsolved codes.

read more | digg story

February 19, 2006 Posted by | Science, Security, technology | 1 Comment

EMP Warhead Tested

“Britain, which has taken the lead in developing EMP (ElectroMagnetic Pulse) devices, is testing a new EMP warhead with the United States. This weapon is intended for use in cruise missiles or UAVs, for attacks on enemy command and control centers.”

read more | digg story

February 19, 2006 Posted by | Science, Security, technology | Leave a comment