Tag Archives: security

Quick tip: Veracrypt on a Raspberry Pi 2 [update: Veracrypt 1.18]

My recent blog post seems to be somewhat outdated. Here is an update to install Veracrypt 1.18 on a raspberry 2 with OS Raspbian GNU/Linux 8 kernel 4.4.13. First one needs to install We assume that you downloaded VeraCrypt_1.18_Source.tar.bz2 into … Continue reading

Posted in Encryption, Security, Security/Encryption | Tagged , | 4 Comments

Apache commons-collections vulnerability – try it at home

The commons-collections certainly belong to the most popular java libraries out there and are used by many projects and people, including me. In my opinion it is beautiful library, has a nice API, fantastic test coverage etc. In many situations … Continue reading

Posted in Programming, Security, Security/Encryption | Tagged , , , | 2 Comments

TLS/SSL certificate exchange in Java

In today’s blog post, we will take a look on how to handle (somewhat self-signed) certificates in Java. 1. Example server using spring-boot Let’s set up a minimal spring-boot RESTful service. Basically a ‘Hello world’-type one. Nothing fancy, just for … Continue reading

Posted in Programming, Security, Security/Encryption | Tagged , , , , , | Leave a comment

Quick tip: Veracrypt on a Raspberry Pi 2

As a long-year user of Truecrypt, whenever I set up a new system, Truecrypt has been among the first pieces of Software that I install. By the time I acquired the new Raspberry 2, I was willing to give Veracrypt … Continue reading

Posted in Encryption, Security, Security/Encryption | Tagged , | 6 Comments

The RC4 stream cipher

Today I will continue my crypto-101 series with the very popular stream cipher RC4 (Ron’s code 4 by Ronald L. Rivest). I want to say at the very beginning that RC4 is not regarded as secure anymore as by today’s … Continue reading

Posted in Encryption, Programming, Security | Tagged , , , , , , , , | Leave a comment

The Fappening

Shortly after the leak of naked pictures of a bunch of celebrities, among which Jennifer Lawrence had the biggest share, there are first rumors about how it was done. One of them is that the following Python script was used: … Continue reading

Posted in Passwords, Security | Tagged , , , , , , | Leave a comment

Creating a password list for WPA/WPA2 dictionary attacks

In this post I will discuss some options of creating your own and most likely unique list of passwords, which can be used for dictionary attacks against certain security setups like WPA. I have to insist that you read and … Continue reading

Posted in Passwords, Security | Tagged , , , , , , , , , , | 1 Comment