Category: Computer Tech

  • FortiGate SD-WAN

    FortiGate SD-WAN

    SD-WAN (software defined WAN) is a topic that is much discussed in the last couple of years but one that is also the least understood. One of the reasons for this is that there are different implementations of SD-WAN leading to misunderstandings in how SD-WAN is used. So what is SD-WAN? It’s an overlay technology…

  • The little camera that could

    The little camera that could

    IT and Network Security is a tough arena. Keeping networks, systems and data secure from what can only be called a total onslaught of malware and other malicious attacks, is a difficult task. What makes the task even more difficult is the general indifference of (especially) SMEs to the potential harm that can be caused…

  • Storm in a WhatsApp teacup?

    Storm in a WhatsApp teacup?

    Facebook’s recent update of the Terms of Service for Whatsapp has got a lot of people riled up. And quite rightly so. The core of this issue is not privacy of information as many believe, but rather pure business economics – let’s cover the basics first. There are 2 primary considerations for using cloud services…

  • Mikrotik guest VLAN with Cap AC

    It’s past time to create additional VLANs on my home network for IoT and guests, so I decided to take the plunge and see what configuration was required on my Mikrotik AP. The basic physical network topology is: internet <—> firewall <—> L2 switches <—> CapAC <—> users As I’m not using an L3 switch…

  • Centos bails

    Centos bails

    Wow. What a week. I’m almost not sure to start but let’s give this a go. Red Hat’s had a pretty hard week convincing Centos users that their announcement Tues (15th Dec) deprecating Centos 8 (and Centos downstream in general), is A Good Thing(tm). How did this come about? Centos is one of the most…

  • The trouble with SPAM

    The trouble with SPAM

    The queries I’ve been getting lately requesting checks on whether a particular email is spam or not, has been enlightening. It’s clear there’s a problem. Somewhere. Email users are not seeing the “wood for the trees” no matter the fact that spam has been an entrenched part of our lives for a couple of decades…

  • SSL/TLS Certificate lifetime

    SSL/TLS Certificate lifetime

    The SSL/TLS certificate revocation system (CRL and OCSP) is broken. This is a fact known for a long time by the whole certificate industry. Long-lived certificates that have issues (eg. a certificate that was fraudulently issued), hang around on the Internet for extended periods (currently up to 3 years) potentially causing security and authenticity issues.…

  • Browser Security

    Browser Security

    Browser technology and security events always make for interesting reading especially due to the fact that we do the majority of our online work these days through browsers, be it general web surfing, accessing enterprise apps or managing systems and devices. Browser features and security are therefore critical – this shouldn’t even need to be…

  • Cloud Services and Availability

    Cloud Services and Availability

    From the way that Cloud vendors promote their wares and how apologists fawn over these services, one would think that Cloud was the be all and end all of computing. The fact is that we’ve been here before and Cloud is just a more advanced form of central or mainframe computing from the 60s and…

  • The Apple/Google contact tracing API

    The Apple/Google contact tracing API

    Apple and Google (yes generally understood to be “sworn enemies” 😀 ) jointly developed an API to be used by contact tracing apps and released said API late in May 2020. Apple and Google’s API follows a decentralized approach, which means that every operation that might involve privacy is carried out on users’ phones, rather…

  • Are you BIASed?

    Are you BIASed?

    A new vulnerability in the authentication component of the Bluetooth wireless protocol has been uncovered by a group of researchers. The issue is not relating to a bug but rather the specification itself. “The Bluetooth standard includes both a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other using…

  • NAS and SMR collide

    NAS and SMR collide

    A ‘brief’ primer on NAS TL;DR move to the next section if you find this boring … NAS, being the (mostly) cheaper cousin to SANs, is used pervasively everywhere from SOHO environments to large corporates. Netapp (Network Appliance) basically invented the category in the 90’s with their F-series of units combining SMB and NFS access,…

  • RDP – the gift that keeps on giving

    RDP – the gift that keeps on giving

    It’s long been known (at least in security circles) that the RDP protocol, as well as client and server implementations, are horribly broken. While a BlueKeep (the most recent RDP vulnerability) worm has yet to surface, brute-force password attacks on RDP services are a dime a dozen and occurring at a rapid rate. PoC code…

  • The great web developer con

    The great web developer con

    Another day, another dodgy web developer story. The premise: We would like to offer you a website design for X amount. But to do so, we need to transfer your domain to us. This tale is a pretty old one but it appears to be flourishing – the lure of a good once-off price for…

  • DMARC: optimising email delivery

    DMARC: optimising email delivery

    Email is a fickle thing … There are a huge amount of dependencies involved in what seems like a small task – sending an email. What started out as a simple method of exchanging messages has morphed over the years into a cobbled-together monster as needs changed and especially businesses required a more robust and…