Category Archives: Technical

Category for technical content.

Apache: Using X-Frame-Options To Evade Click-Jacking

Click-Jacking. It tells you all about it on the Wikipedia article. This posting is about how to avoid security scans telling you to disable click-jacking, if you are using the Apache web server software. If you’re using IIS, you are … Continue reading

Posted in Technical | Tagged , , | Comments Off on Apache: Using X-Frame-Options To Evade Click-Jacking

The Xcode Ghost In Your Apps

We are seeing a number of instances where people have installed legitimate applications from the Apple App store, and their phone is communicating with the Xcode Ghost malware infrastructure across the network. This sort of malware infection is a bit unusual … Continue reading

Posted in Malware, Technical | Tagged , , , , , | Comments Off on The Xcode Ghost In Your Apps

Windows Server Updates: Use The Proxy

This is a more technical note than usual because I happened to have a Windows 2012 server that was refusing to see any Microsoft updates. And as someone who goes around telling people to patch their servers, it is somewhat … Continue reading

Posted in Technical | Tagged , | Comments Off on Windows Server Updates: Use The Proxy

How Effective Is Anti-Virus Detection?

Out of amusement I decided to take one of those strange email spams telling me about an order that I never made (“Order no. 7160668120”), and see if the attachment was detected as a virus. To make things interesting, the … Continue reading

Posted in Malware, Technical | Comments Off on How Effective Is Anti-Virus Detection?

Enhancing SSH Server Security

Every so often after I run security scans, I think about investigating making ssh more secure. Normally I don’t have the time to do it, but this time I have made the time. It turns out that whilst the ssh protocol … Continue reading

Posted in Technical | Comments Off on Enhancing SSH Server Security

Security Conference: 30C3

The content pointed to here is a bit more technical than is usually posted here, but this blog is not just for introductory material. Basically I’ve been through many of the 30C3 videos and picked out some of the more … Continue reading

Posted in Technical | Comments Off on Security Conference: 30C3

Password Audit Procedure

This blog entry is intended to document a technical procedure used to perform a password audit. This is mostly intended for future use by security analysts who may be called on to perform a password audit, but is published here for … Continue reading

Posted in Passwords, Technical | Comments Off on Password Audit Procedure