Public WiFi-hotspots and sensitive information, a good combination?

Read e-mail safely on travel

The holiday has been started, you love to check your e-mail, Facebook or WhatsApp at your holiday location but can you trust the provided Wi-Fi-connection? The answer is: NO. Never trust these kind of Wi-Fi-networks. Maybe somebody has set up a wireless access point (AP)/WLAN-hotspot with the same name as the access point of your… Continue reading Public WiFi-hotspots and sensitive information, a good combination?

Cisco type 8 and 9 password hashes calculated using Java

In this article I will discuss three types of algorithms used by Cisco to calculate hashes from plain-text passwords, namely: Type 4, Type 5, Type 8 and Type 9. Back in the year 2013, the Type 4 algorithm was proven insecure because of an implementation error. The algorithm does not use PBKDF2 and does not… Continue reading Cisco type 8 and 9 password hashes calculated using Java

Connecting to remote SSH-server from within company firewalled network

Problem 1: Often company firewalls/web proxies only allow outgoing traffic to HTTP and HTTPS ports, but you also would like to connect to a remote SSH-server. A trick is to start the remote SSH-server at the port which is normally reserved for HTTPS-traffic. Most of the time it is in this way possible to connect… Continue reading Connecting to remote SSH-server from within company firewalled network