Impact of the Diginotar hack

In June 2011 Diginotar, a Dutch provider of SSL certificates, was hacked. The hack was probably carried out by hackers working for the government of the sovereign nation of Iran for the purpose of obtaining forged SSL certificates for a number of high level domains, such as Google and Yahoo, among others. With the help of those forged certificates, it was possible to snoop on encrypted communication of Iranian citizens by using them in a classic “man in the middle” attack. While the successful hack is significant in and of itself, it has far-reaching implications for the entire world. Continue reading “Impact of the Diginotar hack”

Applying a patch to wine to solve wine bug #8826

Wine bug #8826 is about not having visible fire and smoke in the game Silent Hunter 3 until zoomed out really far. Not seeing the smoke and fires can be a bit strange, especially if you can hear the fire blazing, but nothing is visible. This post will attempt to explain how to apply a patch to wine so that fires and smoke are visible. Caution: this means you will have to patch the wine source code and compile it, then install it into an alternative location in order to preserve the wine version that shipped with your distribution. Continue reading “Applying a patch to wine to solve wine bug #8826”

Anonymous threatens to destroy Facebook (or not?)

In strong words, Anonymous condemns Facebook for its violation of user’s privacy. In addition, the collective announces that on November 5, Facebook will be destroyed. November 5 is Guy Fawkes’ Night in the UK, on which people celebrate the foiling of the gunpowder plot to blow up the House of Lords. The Guy Fawkes’ mask worn by the character ‘V’ in the film ‘V for Vendetta‘, has been adopted by members of Anonymous (or their supporters) and Anonymous has made references to Guy Fawkes before. Continue reading “Anonymous threatens to destroy Facebook (or not?)”

U-Boot

Ever since I was a young boy, I have been fascinated by submarines. Especially by the German u-Boot from World War 2. I don’t know why, but there is something about this sinister, deadly warship that really attracts me. Yes, I know there have been major advances in submarine technology. I know that today’s submarines are far more potent and deadly and I know that the U-Boot was not even a proper submarine but a submersible warship. Regardless of that, the German U-Boot Waffe achieved some amazing feats during the course of the war. So much so that Winston Churchill wrote that the only thing that ever really frightened him during the war, was the U-boat peril.

Continue reading “U-Boot”

Prius

One of the things I have always wanted to do, ever since Toyota launched the Prius, was drive one. Not too long ago, “thanks” to an accident, I had the opportunity to drive a Prius. It was a new model, which Toyota touts as the most advanced car in the world. That raises a person’s expectations. The question is, does the Prius deliver? Continue reading “Prius”

Migrating spamassassin from db files to MySQL

In this post, we’ll take a look at how to migrate spamassassin from the default db files to a MySQL database. The assumption is that you have a working mail server that already does spam scanning and where spamassassin stores its information in the default db files. In order to improve speed, especially for auto-expiry but certainly also for spam filtering itself, it is advisable to store the data in a faster database. Continue reading “Migrating spamassassin from db files to MySQL”

The ssh files (2)

Welcome to the second instalment of the ssh files. In this instalment, we’ll be taking a look at logging in without a password, using public key authentication. The major benefit of logging in through public key authentication, is that you will only have to remember the pass phrase of your key and no longer a dozen or more passwords on different servers. Also, setting your ssh daemon to only allow public key authentication will foil any attempts by script kiddies to brute force your password…because there isn’t one. Continue reading “The ssh files (2)”