You were never here, you didn't see anything..

Category Archives: Security

Security related tips and information.


I recently came across a blog post that inspired me to install ELK on a server and pipe the log data to it from pfsense. Fantastic article, fantastic dashboard and wonderful inspiration. I banged my way through things armed with the blog post and several Internet searches. In the end Read more…


This is long overdue and I was reminded of that by a comment asking what the throughput looks like for this configuration. So, without further ado, here are some bandwidth numbers from iperf3 passing through a Nokia IP-690 running pfsense. Note this is on my live network so there is Read more…


Having the hardware in house, it was time to load it. I chose pfsense as the starting OS for my IP690 install due quite simply to features. It has everything I wanted to include all of the features that were missing in other firewall distributions I have used in the Read more…


First of many, this is the dmesg output from pfsense booting on the Nokia IP690: EDIT: Seems the CMS in use for the site likes to eat a few characters in certain cases. Just in case, a text version of the dmesg.boot can be found here.


The IP690 is a very nice hardware platform, so the only question was software. Can pfsense be loaded on to the platform and run well. The short answer (spoiler alert) is yes.


Android is a fairly nice OS for mobile devices. While I think parts of the OS itself are a mess, it does it’s job and does it well. Even looks good for the most part. My biggest problem with android, it is a data collection point for Google, and they Read more…


Recently there has been a lot of news surrounding Truecrypt. For those who are not aware, Truecrypt offers disk encryption across several platforms (Windows, Linux and Mac) which is relatively easy to use. The news that erupted on to the Internet was that it was insecure and had come to Read more…


During a recent security scan of the network I manage at work I came across an unauthorized Access Point. I started poking around to locate and lock down the AP but hit one major bump, I could not find a way to show which machines were associated with the AP that was on the network. The AP in use (that is supposed to be there) is a Linksys WAP54GP.


It is a long standing practice on a Linux desktop system that runs X to disable the TCP listening port which defaults to 6000. This port is by default enabled and a potential security risk, a nasty one since most people never access their X server via network.


I recently put up a post noting that I had acquired an android phone. I have been taking things slow for a Linux guy and learning my way around before I get too carried away with things. Being a long time Linux user and android being a Linux based platform Read more…

Pages: 1 2 Next

Most who fail…

Most who fail have yet to really try!