GrouNation

Friday, February 11 2011, 20:02
Manage Xresources
By webmaster – System – Permalink

Some simple but very usefull tips to manage Xresources
Continue reading…
2 comments no trackback
Monday, February 7 2011, 08:38
PolyXene secure Operating System
By webmaster – Security – Permalink

PolyXene is a certified high-security operating system that enables secure access, from one single work station, to several distinct and non-standardized networks and to data of different sensitivity levels.
Continue reading…
no comment no trackback
Thursday, June 3 2010, 11:21
Sécurité et langage Java
By admin admin – Security – Permalink

 

Un certain nombre d’idées reçues circulent sur l’apport relatif des différents langages de programmation en matière de sécurité, mais les études techniques détaillées sur le sujet sont relativement peu nombreuses. C’est une des raisons pour lesquelles l’ANSSI a choisi de lancer l’étude Javasec.
Continue reading…
2 comments no trackback
Friday, May 28 2010, 09:41
Qubes OS and formally verified microkernel
By admin admin – Security – Permalink

 

Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. In the future it might also run Windows apps.
Continue reading…
no comment no trackback
Wednesday, February 10 2010, 08:01
Supergeek pulls off ‘near impossible’ crypto chip hack
By admin admin – Security – Permalink

 

Tarnovsky figured out a way to break chips that carry a “Trusted Platform Module,” or TPM, designation by essentially spying on them like a phone conversation. … Using off-the-shelf chemicals, Tarnovsky soaked chips in acid to dissolve their hard outer shells. Then he applied rust remover to help take off layers of mesh wiring, to expose the chips’ cores. From there, he had to find the right communication channels to tap into using a very small needle. …
Continue reading…

 

no comment no trackback

Monday, January 25 2010, 09:24
OpenBSD encrypted partition
By admin admin – Security – Permalink

In this article you will find all the information to get an encrypted disk or partition (for example /home) on you OpenBSD system.
Continue reading…
no comment no trackback
Friday, July 31 2009, 09:54
Applied Cryptography
By webmaster – Cryptography – Permalink

Resources to understand the basic concepts and implementations of the cryptography.
Continue reading…
no comment no trackback one attachment
Thursday, June 25 2009, 14:56
Import PKCS#12 certificate in Opera
By webmaster – Security – Permalink

How to import a PKCS#12 certificate (including private key) with Opera 9.5 and beta 10.
Continue reading…
7 comments no trackback
Thursday, March 12 2009, 11:48
Mount OpenBSD NFS export from GNU/Linux
By webmaster – System – Permalink

Mouting an OpenBSD NFS export from a GNU/Linux client fails with mount.nfs: mount system call failed
Continue reading…
7 comments no trackback
Friday, January 30 2009, 00:28
Blog update to Dotclear v2
By webmaster – General – Permalink

Hi all,
i am currently updating the site to Dotclear v2.
It will probably happen some malfunctioning, so I apology in advance.
I expect you will enjoy the new site and the new theme.

Any comments are welcome !!

Thanks.
5 comments no trackback
Sunday, September 7 2008, 17:42
Virtualizing the Trusted Platform Module
By webmaster – Security – Permalink

Based on the IBM Research Report on vTPM, this article intends to detail the concepts of a TPM emulation on virtualized context.
Continue reading…
10 comments no trackback 3 attachments
Saturday, July 5 2008, 13:01
Linux Broadcom TIS TPM
By webmaster – Security – Permalink

This article gives additional informations to use the Broadcom TPM BCM0102 with the TIS driver. This TPM is included in my DELL Latitude D630 laptop.
Continue reading…
12 comments no trackback
Friday, July 4 2008, 11:29
How to use a TPM with Linux
By webmaster – Security – Permalink

The goal of the article is to offer a simple tutorial to use your onboard TPM to secure your system. The TPM can offer security for a trusted boot and create a chain of trust for over applications.
Continue reading…
75 comments no trackback 6 attachments
Thursday, July 3 2008, 22:14
Les logiciels libres & GNU/Linux
By webmaster – General – Permalink

Le but de ce rapport est d’avoir une vue globale des logiciels libres, de la philosophie, des acteurs et de voir dans quels secteurs économiques des changements sont à venir.
Continue reading…
no comment no trackback
Wednesday, July 2 2008, 01:08
VIA C7 Padlock on Debian Etch
By webmaster – System – Permalink

This article explains :
How to configure the kernel to activate Padlock
How to configure OpenSSL to use the hardware engine
How to configure OpenSSH to use OpenSSL Padlock engine
Continue reading…
3 comments no trackback
Thursday, May 22 2008, 21:21
Monitor mode with a Wireless Intel Corporation PRO/Wireless 3945ABG Network card
By webmaster – Security – Permalink

The default driver Linux driver iwl3945 does not accept monitor mode anymore. This tutorial explains how install the ipwraw driver instead.
Continue reading…
4 comments no trackback
Friday, April 4 2008, 22:20
Linux Security Tools
By webmaster – Security – Permalink

In this article, you will learn about some of the most important Linux security tools. The goal is not to explain how to use them but only propose a list with references which will be updated frequently.
Continue reading…
no comment no trackback
Thursday, April 3 2008, 01:33
SSH Dictionary Attack Prevention with iptables
By webmaster – Security – Permalink

Once you have a SSH server available on internet, you are exposed to SSH brute-force attacks which are rather annoying. It is frequent to observe thousand of connexion attempts with multiple common login and password. This article intends to solve this problem with specific iptables rules.
Continue reading…
6 comments no trackback
Monday, March 3 2008, 21:58
Secure Deletion of memory
By webmaster – Security – Permalink

With the use of disk encryption softwares to protect data on mobile computer, how can you be sure to ensure data confidentiality ? What is the threat if an attacker gain access to sensitive data which was supposed to be erased. ?
Continue reading…
no comment no trackback
Monday, March 3 2008, 21:15
Lancement du site
By webmaster – General – Permalink

Bienvenue à tous en cette fin de soirée, ce premier post marque le lancement du site GouNation. Le premier pas est fait, mais le plus important est à venir !!
4 comments no trackback