Security

SPF & DKIM Records in Route 53

4 min read

I'm going to do a more detailed post on emailing from Amazon's infrastructure soon, but in the meantime I wanted to quickly throw out solutions too a couple of …

Unregistering From WhisperPush After Flashing a New ROM

3 min read

I've been playing around with my Nexus 5 lately. It was quickly rooted and I began playing with various ROMs that had been pre-built for the Nexus 5. My first …

Calculating RSA Key Fingerprints in Ruby

3 min read

I regularly find myself working on projects that involve the manipulation and storage of RSA keys. In the past I've never had to worry about identification or …

Creating Crypt Style SHA512 Passwords With Ruby

1 min read

I needed to generate crypt-style SHA512 passwords in ruby for an /etc/shadow file. After a bunch of Googling and messing around with the OpenSSL library I …

Using VIM as Your Password Manager

4 min read

There are all kinds of password managers out there. Everything from web services that are quite solid and respectable, to native desktop apps. A lot of these …

Keep Your Gems Updated

3 min read

I recently went back through my backups recently and found quite a few old abandoned projects. Looking back on the code I see some things I'm impressed with, …

Auditing Heroku SSH Keys

2 min read

A good friend of mine recently left the organization I work for and the task of resetting our passwords and auditing credentials fell on me. Since we use Heroku …

Security Through Obesity

5 min read

Jeremy Spilman recently proposed changes to how user's hashes are stored in website's and companies databases. This post was originally going to look at some of …

Thoughts on IPv6 Security and Mitigation

5 min read

I setup IPv6 on my home network with an OpenWRT router and Hurricane Electric and now I suddenly have an opinion on the state of IPv6 security. This is …