Archive | Technology RSS feed for this section

Technology content from Leo Nelson

O.C.E.A.N

Ed Sutton on the dangers of big data and how everything we do, online or offline, leaves a digital footprint behind. He describes how every purchase with a card, every search, every movement with a smart device and every social media interaction (Likes, Retweets etc.) get stored. When used in aggregate, this data reflect a social and identity fingerprint that uniquely identifies you and furthermore can predict your behaviors and responses.

The Big Five: Openness (how open are you to new experiences?), Conscientiousness (how much of a perfectionist are you?), Extroversion (how sociable are you?), Agreeableness (how considerate and cooperative are you?), and Neuroticism (how sensitive/vulnerable are you?). With these five dimensions (O.C.E.A.N.), you can determine fairy precisely what kind of person you are dealing with—their needs and fears as well as how they are likely to behave.

Source: Trump Knows You Better Than You Know Yourself

The No More Ransom Project

No More Ransom is an international initiative that shows the value of public-private cooperation when taking serious action cybercrime. This collaboration goes beyond geographical borders. The main aim of the project is to share knowledge and educate users across the world on how to prevent ransomware attacks. We believe that it will eventually lead to support for repairing the damage caused to victims all around the globe. By restoring access to their systems, we empower users by showing them they can take action and avoid rewarding criminals with a ransom payment.

Source: The No More Ransom Project

SSH Server Auditing

SSH-Audit is a tool for SSH server auditing.

Features

  • SSH1 and SSH2 protocol server support;
  • Grab banner, recognize device or software and operating system, detect compression;
  • Gather key-exchange, host-key, encryption and message authentication code algorithms;
  • Output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
  • Output algorithm recommendations (append or remove based on recognized software version);
  • Output security information (related issues, assigned CVE list, etc);
    analyze SSH version compatibility based on algorithm information;
  • Historical information from OpenSSH, Dropbear SSH and libssh;
    no dependencies, compatible with Python 2.6+, Python 3.x and PyPy;

Source: SSH Server Auditing