Security

Security in the virtual world: online, computers and software security.

Safe Browsing Guide - II

Safe Browsing Guide – II

Continued from Safe Browsing Guide – I You might get some ‘warnings’ while opening secure pages, like below: The first one means that the certificate could have been signed by anyone, including by someone you do not trust. If all I need is encryption: for example if I am sending email, and not sending any [...]

Safe Browsing Guide – I

Safe Browsing Guide – I

When you browse over the Internet, or Chat, or send/receive email – you are not doing that in private. It is important to understand exactly what is private, and what steps you need to follow to maintain the privacy. When accessing any website such as Yahoo.com, you get connected to the web site’s server which [...]

DNS poisoning – in plain English :-)

What is DNS poisoning, why it affects everyone accessing the internet and how to fix it.

Automate encryption with GPG

Automate encryption with GPG

This blogpost requires some familiarity with GPG. Today I want to share the scripts for running GPG in the batch (unattended) mode. You can have a password on the keys if you want, but since this is the automated mode, you may want to use keys without a password. Irrespective of whether or not you [...]

SFTP>FTP+GPG

SFTP>FTP+GPG

Shows that FTP+GPG combination cannot be used in place of SFTP – SFTP is still more secure. Also includes a howto document on setting up passwordless SFTP based automated file transfers.

QR Codes

QR Codes

I came across QR codes recently. QR stands for Quick response. The coded message looks something like this: In Japan, they are printed on business cards so that you can take a photograph of the code with your mobile phone, and use special software (also in the phone) to decode it. It makes your life [...]