Category Archives: Security

Can you go from Terminal 1 to Terminal 2 in O’Hare without going through the security lines again?

Yes. Yes, at least if you walk. Not sure about other transportation options. Count on about 13 minutes for the walk. Not sure why this information is so hard to find… Sometimes you land at one terminal and have to … Continue reading

Posted in Consumer Interest, Security | Tagged , , | Leave a comment

How to test if a web site requires a client certificate

Intro I can not find a link on the Internet for this, yet I think some admins would appreciate a relatively simple test to know is this a web site which requires a client certificate to work? The errors generated … Continue reading

Posted in Admin, Linux, Network Technologies, Raspberry Pi, Security, Web Site Technologies | Tagged | Leave a comment

The IT Detective agency: Live hack caught, partially stopped

Intro In my years at cybersecurity I’ve been sufficiently removed from the action that I’ve rarely been involved in an actual case. Until last night. A friend, whom I’ll call Jute, got a formal complaint about one of his hosted … Continue reading

Posted in Admin, DNS, Network Technologies, Security | Tagged , | Leave a comment

Great serial port concentrator: Raritan Dominion

Intro Every now and then you find a product that is a leap ahead of where you were. Such is the case for us with regards to our product of choice for serial consoles. The old For Bluecoat (Symantec) proxy … Continue reading

Posted in Admin, Security | Tagged , , , | Leave a comment

Suppress /apple-touch-icon URLs on an F5 ASM

Intro Displaying the ASM event log is slow – it can take minutes on our older equipment. So anything that helps cut out the clutter in the returned log entries may save precious minutes of, e.g., paging to the next … Continue reading

Posted in Security | Tagged , | Leave a comment

LDAP authentication on the F5 BigIP without Access Policy Manager

Intro I recently received revised guidelines for dmz best practices which mentioned a requirement to implement application-independent authentication using the F5 web application firewall. I had never heard of it and didn’t think it was possible without buying the very … Continue reading

Posted in Network Technologies, Security | Tagged , , | Leave a comment

The IT Detective Agency: the vanishing certificate error

Intro I was confronted with a web site certificate error. A user was reluctant – correctly – to proceed to an internal web site because he saw a message to the effect: I tried it myself with IE and got … Continue reading

Posted in Admin, Linux, Security, Web Site Technologies | Tagged | Leave a comment

The IT Detective agency: Some insights into 4096-bit SSL keys

Intro I was recently asked if a new certificate a web site is about to deploy would require any changes to our clients such as needing to import this certificate into their Java keystore. The details Well, I saved the … Continue reading

Posted in Admin, Network Technologies, Security | Leave a comment

Whois information without the pushy hard sell tactics

Intro Did you ever want to learn about a domain registration but were put off by the hard sell tactics that basically all web-based whois searches subject you to? Me, too. Here’s what you can do. The details Linux – … Continue reading

Posted in DNS, Linux, Network Technologies, Raspberry Pi, Security | Tagged , , , | Leave a comment

Fail2ban fails to work, I built my own

Intro I’ve sung the praises of fail2ban as a modern way to shutdown those annoying probes of your cloud server. I recently got to work with a Redhat v 7.4 system, so much newer than my old CentOS 6 server. … Continue reading

Posted in Admin, Linux, Security | Tagged | Leave a comment