Ransomware is getting more and more widespread. The time has come for a secure on-line backup. In this article I shortly explain, how to create a secure on-line storage space using Linux and two existing programs sshfs and encfs.
This solution will work for two Unix machines. It might be not the same convenient and functional as existing consumer cloud storage solutions. The advantages are however good security, standard software used and "trust no one" (TNO) nature of the solution.
Bluedio Hurricane Turbine H is a great piece of technology. I wanted to write
a review for
these headphones for a long time. The reason for this is that I am fascinated by
how good and practical this thing is and after all how inexpensive.
Just because this pair of headphones doesn't cost a fortune some
might think of it as of low-quality-ware right away. Well, my 5-months test of Bluedio Hurricane Shooting Break
seems to show that the quality is reasonable and the value of the buy turns to be great.
I present here an in-depth review of the great Bluetooth
headphones for less than 30 Euros.
Reading the OWASP cheat sheet on
input validation
I have come across the rule, which can do a lot of harm, when not used wisely.
The rule
to use "image rewriting libraries to verify the image is valid and to strip away
extraneous content" can lead to the use of insecure code in your web application.
We all remember the not-yet-over series of
Stagefright
bugs in Android. I say "not-yet-over" because it is extremely hard to secure the
highly polymorphic and at the same time low-abstraction-level C++ in which this
complex library is written. In principle, sanitizing the images with a-like
library on your web server opens the way to vulnerabilities similar to Stagefright.