Password authentication is a one factor authentication method, by using something you know. Choosing passwords and remembering them are delicate[…]
Read moreMonth: December 2013
Professional Special Subject – w5 log
This week i’ve understood that an out of the box deployment is never what you want. Especially for an NSM[…]
Read moreStart your own business presentation by Ridha Shimi
We had a nice presentation today, done by a guest from Udvikling Fyn (Development Fyn). The guests name is Ridha Shimi[…]
Read moreSnort tunning
It is basically useless to run great pieces of software if they are not configured according to user/system needs. An out[…]
Read moreWeekly database backup (compressed and encrypted)
I had the task of doing regular database backup on a server here at school and i needed some automatization.[…]
Read moreHuawei EULA
I was really bored some days ago, while waiting for something. I started to randomly browse my phone and ended up[…]
Read moreHow to root Huawei Ascend Y210
About a few weeks ago i mentioned that i bought a Huawei Ascend Y210, one of the cheapest Android smartphones[…]
Read moreProfessional Special Subject – w4 log
Week4 was all about digging into how Snort works, Snort rules and IT security lecturing. I had some resources prepared[…]
Read more10 rules of information security
While googling for resources related to my profesional special subject project, i came across some nice IT Security/Networking related websites,[…]
Read moreCreating your first Snort rule
I’ve talked about understading the basics of a Snort rule before, now i’m going to create my first rule and[…]
Read more