Copyright 2021 Simon Quantrill, All Rights Reserved

Sextortion your child could be next take action

Tue 31 March 2015
19 December 2014 the BBC http://www.bbc.com/news/technology-30494566 reports on an unfortunate incident where a teenager takes his own life by jumping off a bridge. He had been blackmailed on the internet apparently by a group from the Philippines. The teenager was tricked into a Skype conversation …

Home networks not safe

Fri 13 March 2015
Infosec Reports this morning that Trend Micro have discovered a Malware strain that can scan your home network by attaching itself to your router then deleting itself.. TROJ_VICEPASS attempts to trick you to install using the disguises itself as an update to flash. The research from trend tells us …

Modifications for LDAP authentication debian and ubuntu

Tue 10 March 2015
This is an older tip for setting up ldap authentication, as many of mu posts are just my notes from the past it might now be dated. However feel free to try it for yourself ;) aptitude install libpam-ldap libnss-ldap patch autofs nfs-common openldap-utils aptitude install nscd NB: in Configuring libnss-ldap …

Save your business thousands of dollars

Mon 09 March 2015
According to Kaspersky 35% of the worlds businesses do not encrypt data on their computers. What happens if you lose a laptop or a usb key with important business data on. In 2007, was fined £980,000, for having their own laptop stolen from an employees house that happened to …

Cybercrime focuses on small businesses, keep safe

Wed 04 March 2015
Modern hackers generally try to exploit and attack computer systems that are not updated or patched, this does not count the thousands of script-kiddies that run the scripts created by the developer-hackers or the attacks reported to come from funded organisations be that crime organisations or government organisations. In the …

Superfish vulnerability adware pre-installed on computer systems

Sat 21 February 2015
Through the years computer manufactures in a bid to provide, “more for less”, tend to package together software with their hardware. This software usually fits fairly well with the PC and is normally quite useful to the new pc owner. However sometimes this does go wrong, as in the recent …

Really cool Cyber threat map

Wed 18 February 2015
Having a quick browse around for malware and virus related information I found this map, showing the global cyber threat, as I thought it was real cool I am sharing.. ;) Ok this time I have actually added the link so you can see it.. I will get used to wordpress …

Vulnerability in Microsoft software

Wed 11 February 2015
So very important this one.. Basically if your using any windows operating system with VPN or signed into active directory in a public place or travelling in hotels and such there could be somebody in the middle looking at your data! This kinda pretty much covers most business and business …

Time management in IT

Tue 10 February 2015
Many times throughout my career I have heard that fateful.. You need to take a time management course. Arggggh… And the answer is always the same, “sorry that doesn’t work for IT as IT is interrupt driven”. I have tried all sorts, The first book I read was Getting …

Using an encrypted usb key for gpg and ssh keys

Mon 09 February 2015
This is one form the archives but probably still useful to somebody.. Ok this is the way I store my gpg and ssh keys on an encrypted usb stick, this is really only relavant to linux users using laptops however there is an element of geek factor so ill go …