Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Peter

Shimmers inside chip and pin devices

Posted on February 11, 2017 by Peter

Recently shimmers made a lot of noise in the news and became popular to be installed in ATMs as they are very small.
Can they be installed inside chip and pin devices? Or where else can they be installed?
How to protect you… Continue reading Shimmers inside chip and pin devices→

Posted in ATM, banks, credit card

How to store and open files without making them recoverable?

Posted on February 7, 2017 by Peter

I would like to store and work with some files but simply set a password to my Windows account isn’t enough as the hard drive can be removed and the files can be recovered.

I am wondering if I create an encrypted container w… Continue reading How to store and open files without making them recoverable?→

Posted in data recovery, encryption, Windows 10

Do I need Shibboleth? SSO on WordPress + Debian

Posted on January 7, 2017 by Peter

I would like to create a SSO where my users can login to machines and wordpress (php) websites.

So far I have LDAP with Kerberos working. I can login with the same credentials to every service, however I can’t seem to avoid … Continue reading Do I need Shibboleth? SSO on WordPress + Debian→

Posted in ldap, SSO, wordpress

Infecting synchronized devices through the cloud

Posted on December 8, 2016 by Peter

I have a laptop with Windows installed and iPhone both synchronised to Dropbox. Also I use Google Drive app on my phone and on my laptop I access Drive using browser. Which way of using cloud is more safe?
Also I don’t have as strong secu… Continue reading Infecting synchronized devices through the cloud→

Posted in cloud storage, Dropbox, Google Apps, malware

What’s good/bad about this custom password hashing?

Posted on October 13, 2016 by Peter

For the record, this was purely for learning purposes, I’ve been told don’t even use this for a personal website that I don’t expect anyone to visit, so this post is unfortunately the last I’ll see of this code. However, I’ve… Continue reading What’s good/bad about this custom password hashing?→

Posted in hash, passwords

Data Security on a Malicious WiFi Network

Posted on January 5, 2015 by Peter

Let’s assume that I unwittingly connect to a malicious WiFi network and visit some websites. By malicious, I mean the network has been set up for the purpose of stealing data.

From what I’ve read, using https:// is safe. Is this true for … Continue reading Data Security on a Malicious WiFi Network→

Posted in HTTP, TLS, wifi, Wireless | Tagged spoofing

Is an 80 bit password good enough for all practical purposes?

Posted on October 10, 2014 by Peter

I know that asking how many bits of entropy comprise a strong password is rather like asking the length of a piece of string. But assuming the NSA is not on to you, and that it is hardly worthwhile anyone spending a decade br… Continue reading Is an 80 bit password good enough for all practical purposes?→

Posted in entropy, passwords

Intercepting wifi traffic

Posted on March 27, 2014 by Peter

So people always talk about how if you use http over a shared wifi hotspot, people will be able to see your unencrypted data, but I have never been able to make the direct connection from a network security standpoint. I woul… Continue reading Intercepting wifi traffic→

Posted in wifi

Intercepting wifi traffic

Posted on March 27, 2014 by Peter

So people always talk about how if you use http over a shared wifi hotspot, people will be able to see your unencrypted data, but I have never been able to make the direct connection from a network security standpoint. I woul… Continue reading Intercepting wifi traffic→

Posted in wifi

For LUKS: The most preferable and safest cipher?

Posted on July 11, 2011 by Peter

I’m about to encrypt two of my hard drives using LUKS, since I can’t really do it myself I use the guide on the Arch Linux wiki (which can be found here). In an example in the guide the cipher specified is aes-xts-plain with a 512-bit key … Continue reading For LUKS: The most preferable and safest cipher?→

Posted in Disk Encryption, encryption, linux, luks

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M May 4, 2026
  • Spotting third-party cyber risk before attackers do May 4, 2026
  • Roblox Blames Age-Verification Rollout for Lowered Growth. Stock Tumbles 22% May 4, 2026
  • What researchers learned about building an LLM security workflow May 4, 2026
  • Your work apps are quietly handing 19 data points to someone May 4, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up