The holiday has been started, you love to check your e-mail, Facebook or WhatsApp at your holiday location but can you trust the provided Wi-Fi-connection? The answer is: NO. Never trust these kind of Wi-Fi-networks. Maybe somebody has set up a wireless access point (AP)/WLAN-hotspot with the same name as the access point of your… Continue reading Public WiFi-hotspots and sensitive information, a good combination?
Cisco type 8 and 9 password hashes calculated using Java
In this article I will discuss three types of algorithms used by Cisco to calculate hashes from plain-text passwords, namely: Type 4, Type 5, Type 8 and Type 9. Back in the year 2013, the Type 4 algorithm was proven insecure because of an implementation error. The algorithm does not use PBKDF2 and does not… Continue reading Cisco type 8 and 9 password hashes calculated using Java
Raspberry Pi: Cross compile HelloWorld
In this tutorial you will learn the basics how to cross compile a simple program for the Raspberry Pi 2 Model B. Why would you like to cross compile? The two major reasons why you would like to cross compile are: Increasing speed of compilation Decreasing wear out of SD card Besides of that the… Continue reading Raspberry Pi: Cross compile HelloWorld
Connecting to remote SSH-server from within company firewalled network
Problem 1: Often company firewalls/web proxies only allow outgoing traffic to HTTP and HTTPS ports, but you also would like to connect to a remote SSH-server. A trick is to start the remote SSH-server at the port which is normally reserved for HTTPS-traffic. Most of the time it is in this way possible to connect… Continue reading Connecting to remote SSH-server from within company firewalled network