Some simple but very usefull tips to manage Xresources
Friday, February 11 2011, 20:02
Monday, February 7 2011, 08:38
PolyXene is a certified high-security operating system that enables secure access, from one single work station, to several distinct and non-standardized networks and to data of different sensitivity levels.
Thursday, June 3 2010, 11:21
Un certain nombre d’idées reçues circulent sur l’apport relatif des différents langages de programmation en matière de sécurité, mais les études techniques détaillées sur le sujet sont relativement peu nombreuses. C’est une des raisons pour lesquelles l’ANSSI a choisi de lancer l’étude Javasec.
Friday, May 28 2010, 09:41
Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. In the future it might also run Windows apps.
Wednesday, February 10 2010, 08:01
Tarnovsky figured out a way to break chips that carry a "Trusted Platform Module," or TPM, designation by essentially spying on them like a phone conversation. ... Using off-the-shelf chemicals, Tarnovsky soaked chips in acid to dissolve their hard outer shells. Then he applied rust remover to help take off layers of mesh wiring, to expose the chips' cores. From there, he had to find the right communication channels to tap into using a very small needle. ...
Monday, January 25 2010, 09:24
In this article you will find all the information to get an encrypted disk or partition (for example /home) on you OpenBSD system.
Friday, July 31 2009, 09:54
Resources to understand the basic concepts and implementations of the cryptography.
Thursday, June 25 2009, 14:56
How to import a PKCS#12 certificate (including private key) with Opera 9.5 and beta 10.
Thursday, March 12 2009, 11:48
Mouting an OpenBSD NFS export from a GNU/Linux client fails with mount.nfs: mount system call failed
Friday, January 30 2009, 00:28
i am currently updating the site to Dotclear v2.
It will probably happen some malfunctioning, so I apology in advance.
I expect you will enjoy the new site and the new theme.
Any comments are welcome !!
Sunday, September 7 2008, 17:42
Based on the IBM Research Report on vTPM, this article intends to detail the concepts of a TPM emulation on virtualized context.
Saturday, July 5 2008, 13:01
This article gives additional informations to use the Broadcom TPM BCM0102 with the TIS driver. This TPM is included in my DELL Latitude D630 laptop.
Friday, July 4 2008, 11:29
The goal of the article is to offer a simple tutorial to use your onboard TPM to secure your system. The TPM can offer security for a trusted boot and create a chain of trust for over applications.
Thursday, July 3 2008, 22:14
Le but de ce rapport est d'avoir une vue globale des logiciels libres, de la philosophie, des acteurs et de voir dans quels secteurs économiques des changements sont à venir.
Wednesday, July 2 2008, 01:08
This article explains :
- How to configure the kernel to activate Padlock
- How to configure OpenSSL to use the hardware engine
- How to configure OpenSSH to use OpenSSL Padlock engine
Thursday, May 22 2008, 21:21
The default driver Linux driver iwl3945 does not accept monitor mode anymore. This tutorial explains how install the ipwraw driver instead.
Friday, April 4 2008, 22:20
In this article, you will learn about some of the most important Linux security tools. The goal is not to explain how to use them but only propose a list with references which will be updated frequently.
Thursday, April 3 2008, 01:33
Once you have a SSH server available on internet, you are exposed to SSH brute-force attacks which are rather annoying. It is frequent to observe thousand of connexion attempts with multiple common login and password. This article intends to solve this problem with specific iptables rules.
Monday, March 3 2008, 21:58
With the use of disk encryption softwares to protect data on mobile computer, how can you be sure to ensure data confidentiality ? What is the threat if an attacker gain access to sensitive data which was supposed to be erased. ?