Quantcast
Channel: Hardware – /dev/random
Browsing latest articles
Browse All 14 View Live

Image may be NSFW.
Clik here to view.

Wiping & Protecting Data from SSD/Flash Drives

I received a comment from a reader of this blog (hi Ziyad!) about an very old article posted in 2008 (!) about tools to wipe files from drives. I reviewed a list of tools available on Linux (or other...

View Article



Image may be NSFW.
Clik here to view.

Censorship Does Not Increase Security!

ENISA published in September 2009 a press release about the huge increase in ATM fraud. The title spoke by itself: “Annual cash machine looses in Europe approach EUR 500 million: ENISA provides advice...

View Article

Image may be NSFW.
Clik here to view.

SCADA or Medical Devices, Insecure by Default?

SCADA systems are in front of the security scene for a few days since the disclosure of the Siemens default password story. SCADA stands for “Supervisory Control And Data Acquisition“. It’s a set of...

View Article

Image may be NSFW.
Clik here to view.

BackTrack4-R1 + AWUS036NH = Win!

This is a long story… but it is finally solved thanks to the developers of the BackTrack distribution! For a long time, I used a good old Orinoco PCMCIA card to play around with WiFi networks. But it...

View Article

Image may be NSFW.
Clik here to view.

Security: DIY or Plug’n'Play?

Appliance or not appliance? That is the question! A computer appliance is a dedicated hardware which runs software components to offer one of more specific services. Information security has always...

View Article


Image may be NSFW.
Clik here to view.

Why Physical (Network) Security is Important?

When talking about security, companies often focus on the “security perimeter“. Inside this perimeter, you have the “good” guys and all the rest is considered as the “wild” world, the Internet. Once...

View Article

Image may be NSFW.
Clik here to view.

XenServer & Port Mirroring

Blogs are made to provide valuable content to readers (well, I hope for my readers). This time, nothing related to security though… Recently, I built a new virtualization platform at home based on...

View Article

Image may be NSFW.
Clik here to view.

Online Router Forensics Lab

When my friend Didier Stevens contacted me last year to help him with a BruCON 5×5 project, I simply could not decline! Didier developed a framework to perform forensic investigations on Cisco routers....

View Article


Image may be NSFW.
Clik here to view.

My Little Pwnie Box

As a pentester, I’m always trying to find new gadgetstools to improve my toolbox. A few weeks ago, I received my copy of Dr Philip Polstra’s book: “Hacking and Penetration Testing with Low Power...

View Article


Image may be NSFW.
Clik here to view.

The Evil Mouse Project

In March during TROOPERS’18, I discovered a very nice tiny device developed by Luca Bongiorni (see my wrap-up here): The WiFi HID Injector. Just to resume what’s behind this name, we have a small USB...

View Article
Browsing latest articles
Browse All 14 View Live




Latest Images