We have a BitLocker encrypted drive at work and we have lost the recovery password. We think the device was provisioned by a trainee and they forgot to record it. Anyhow, has anyone tried/had any luck with BitCracker? github.com/e-ago/bitcracker
Folksonomy: security
Posts, statuses and bookmarks on philipnewborough.co.uk tagged with: "security"
Find more posts tagged with "security" on Mastodon .
Blog
No blog posts tagged with security.
Status
Just configured fingerprint authentication on my ThinkPad T14s under Debian and it worked first time. The device is listed as '27c6:6594 Shenzhen Goodix Technology Co.,Ltd. Goodix USB2.0 MISC'.
Every time I remove a Linode from my pool and the IP address is assigned to another Linode customer, I receive an early warning report from the National Cyber Security Centre about potential security vulnerabilities on the customer's new server. I'm thinking there is a potential business opportunity here.
Starting my morning by blocking a Ukraine based IP address that is constantly hitting a web server. The server hosts a UK only web store, so pretty sure it's not valid traffic. Will need to monitor this.
Bookmarks
-
The Insecurity of Debian - unix.foo
In the end, the choice between Debian and Red Hat isn’t just about corporate influence versus community-driven development. It’s also a choice between a system that assumes the best and one that prepares for the worst. Unfortunately in today’s highly connected world, pessimism is a necessity.
-
An introduction to Linux Access Control Lists (ACLs) | Enable Sysadmin
Linux Access Control Lists, or ACLs, can take some getting used to, but they're invaluable for getting a finer-grained control of your Linux filesystem permissions.
-
Poor security let hackers access 40 million voters' details - BBC News
The ICO said hackers had access to the Electoral Commissions' systems for over a year. It was only spotted when an employee reported that spam emails were being sent from the commission's own email server.
WOW!
-
Linux maintainers assess blast radius of xz-utils backdoor
-
MegaManSec/SSH-Snake: SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
-
Secure SSH with Windows Hello
-
WordPress installer attack race – Vladimir Smitka
-
Are Passkeys really the beginning of the end of passwords? I certainly hope not!
This problem would not exist had someone not had the amazingly brilliant idea of stuffing HTML into email. The ASCII ribbon campaign was an Internet phenomenon started in 1998 advocating that email be sent only in plain text, because of the dangers of using HTML in email. Go figure, the Unix graybeards were right!
-
trimstray/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.