<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Janik von Rotz</title>
    <link>https://janikvonrotz.ch/tags/security/</link>
    <description>Recent content in Security on Janik von Rotz</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 11 Nov 2024 11:45:58 +0100</lastBuildDate>
    <atom:link href="https://janikvonrotz.ch/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>SSH vs VPN</title>
      <link>https://janikvonrotz.ch/2024/11/11/ssh-vs-vpn/</link>
      <pubDate>Mon, 11 Nov 2024 11:45:58 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2024/11/11/ssh-vs-vpn/</guid>
      <description>&lt;p&gt;When I deploy an application to a server that is owned by the customer or the customers IT provider, they very often require me to setup a virtual private network (VPN) connection. I tell them about Secure Shell (SSH) protocol and how is better fit for this use case. As they are used to Windows server environment, where SSH is mostly absent, they insist on using VPNs.&lt;/p&gt;&#xA;&lt;p&gt;In this post I will compare the two technologies and explain why SSH is the better option in this use case.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source Software = More Security</title>
      <link>https://janikvonrotz.ch/2022/03/07/open-source-software-more-security/</link>
      <pubDate>Mon, 07 Mar 2022 10:53:32 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2022/03/07/open-source-software-more-security/</guid>
      <description>&lt;p&gt;This post has been translated from  &lt;a href=&#34;https://www.mint-system.ch/blog/mint-system-blog-1/open-source-software-sicherheit-33&#34;&gt;Mint System - Open Source Software = Sicherheit&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Why is open source software more secure than closed source software?&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Again and again we are confronted with the argument that open source software (OSS) cannot be secure because it is free. The &lt;a href=&#34;https://en.wikipedia.org/wiki/There_ain%27t_no_such_thing_as_a_free_lunch&#34;&gt;&amp;ldquo;there is no free lunch&amp;rdquo;&lt;/a&gt; idiom is also often used. We will explain here why this argument is wrong.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Paradigm shift in the handling of data</title>
      <link>https://janikvonrotz.ch/2021/05/02/paradigm-shift-in-the-handling-of-data/</link>
      <pubDate>Sun, 02 May 2021 21:30:10 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2021/05/02/paradigm-shift-in-the-handling-of-data/</guid>
      <description>&lt;p&gt;The handling of private data is the subject of controversial public debate. Everyone expresses concerns about the handling of private data, but most people pass it on to third parties via social media without hesitation. A controversy that is often left hanging in the air.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Monitor and audit Active Directory user and group management</title>
      <link>https://janikvonrotz.ch/2017/10/12/monitor-and-audit-active-directory-user-and-group-management/</link>
      <pubDate>Thu, 12 Oct 2017 15:54:08 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2017/10/12/monitor-and-audit-active-directory-user-and-group-management/</guid>
      <description>&lt;p&gt;Traceability is key when collaborating in the Active Directory (AD). Multiple admins changing and updating permissions and policies makes it difficult being compliant with the company&amp;rsquo;s policies. It is important to monitor mutations in the directory. By default audit policies are disabled for Domain Controllers (DC) and must be enabled explicitly. Enabling auditing for the DCs is quite easy, querying the logs for a specific event is a bit more difficult.&lt;/p&gt;&#xA;&lt;p&gt;In this guide you&amp;rsquo;ll learn how to enable auditing for a specific case and how to query the audit logs for a specific event.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Password Generator with PowerShell</title>
      <link>https://janikvonrotz.ch/2015/09/07/password-generator-with-powershell/</link>
      <pubDate>Mon, 07 Sep 2015 15:03:41 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2015/09/07/password-generator-with-powershell/</guid>
      <description>&lt;p&gt;Whenever I had to think of a secure password I followed these steps:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;The right order of vocals and consonants makes it more easy to remember a password.&lt;/li&gt;&#xA;&lt;li&gt;And so do three digits of a number.&lt;/li&gt;&#xA;&lt;li&gt;Add one uppercase Letter. Likely as the first character.&lt;/li&gt;&#xA;&lt;li&gt;Add a dot or another sign to expand to vocabulary even more.&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>free SSL for everybody</title>
      <link>https://janikvonrotz.ch/2015/03/23/free-ssl-for-everybody/</link>
      <pubDate>Mon, 23 Mar 2015 09:09:11 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2015/03/23/free-ssl-for-everybody/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt; is the latest initiative by the &lt;a href=&#34;https://letsencrypt.org/about/&#34;&gt;Internet Security Research Group (ISRG)&lt;/a&gt;.&#xA;Their goal is simple, every site on the internet has to be SSL secured.&lt;/p&gt;&#xA;&lt;p&gt;They want to achieve that by serving an open certificate authority (CA) and also provide a tool to set up a secured site the easiest way possible.&lt;/p&gt;&#xA;&lt;p&gt;And now the big deal about this, their service is free of charge!&lt;/p&gt;&#xA;&lt;p&gt;If this is really a thing, it will be a disaster for the SSL economy. As you might know SSL certificates are everything else than cheap. So good luck to every company that relays on selling SSL certificates as their core competence.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Say Goodbye to TrueCrypt</title>
      <link>https://janikvonrotz.ch/2014/05/30/say-goodbye-to-truecrypt/</link>
      <pubDate>Fri, 30 May 2014 07:21:00 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/05/30/say-goodbye-to-truecrypt/</guid>
      <description>&lt;p&gt;Apparently the developer of TrueCrypt threw in the towel this week.&lt;/p&gt;&#xA;&lt;p&gt;The official site &lt;a href=&#34;http://truecrypt.org&#34;&gt;http://truecrypt.org&lt;/a&gt; redirects to &lt;a href=&#34;http://truecrypt.sourceforge.net/&#34;&gt;http://truecrypt.sourceforge.net/&lt;/a&gt; where you&amp;rsquo;ll find instructions to migrate you TrueCrypt disk to Microsofts built-in solution Bitlocker.&lt;/p&gt;&#xA;&lt;p&gt;The reason for all this is obvious, TrueCrypt can&amp;rsquo;t compete against Microsofts Bitlocker as their software comes with every Windows 8 version (withWindows 7 you had to have an enterprise license in order to use Bitlocker).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Netwars Project - Today’s IT threads well explained</title>
      <link>https://janikvonrotz.ch/2014/05/01/newars-project-todays-it-threads-well-explained/</link>
      <pubDate>Thu, 01 May 2014 13:19:00 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/05/01/newars-project-todays-it-threads-well-explained/</guid>
      <description>&lt;p&gt;This time I want to tell you about the &lt;a href=&#34;http://www.netwars-project.com/&#34;&gt;netwars project&lt;/a&gt;. It&amp;rsquo;s a fact based cross platform experience exploring the impending threat of cyber warfare.&lt;/p&gt;&#xA;&lt;p&gt;There&amp;rsquo;s a web series, tv production, digital graphic novel and soon an audio book will be released.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Install WPScan</title>
      <link>https://janikvonrotz.ch/2014/04/29/install-wpscan/</link>
      <pubDate>Tue, 29 Apr 2014 07:10:57 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/29/install-wpscan/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/11214650&#34;&gt;https://gist.github.com/11214650&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;WPScan is a black box WordPress vulnerability scanner.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Prevent a lot of spam on your next php form with this simple trick</title>
      <link>https://janikvonrotz.ch/2014/04/28/prevent-a-lot-of-spam-on-your-next-php-form-with-this-simple-trick/</link>
      <pubDate>Mon, 28 Apr 2014 12:08:19 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/28/prevent-a-lot-of-spam-on-your-next-php-form-with-this-simple-trick/</guid>
      <description>&lt;p&gt;Spam bots were parsing websites html to code and searching for form patterns. What they luckily don&amp;rsquo;t do in most cases is running javascript or applying css code.&#xA;This behaviour is a good way to tell a human from a spambot apart.&lt;/p&gt;&#xA;&lt;p&gt;Here is a simple example of how to make use of this behaviour to prevent a lot of spam.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open SSL Heartbleed Bug</title>
      <link>https://janikvonrotz.ch/2014/04/09/open-ssl-heartbleed-bug/</link>
      <pubDate>Wed, 09 Apr 2014 15:25:47 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/09/open-ssl-heartbleed-bug/</guid>
      <description>&lt;p&gt;For those who missed it. The OpenSSL project has recently announced a security vulnerability in OpenSSL affecting versions 1.0.1 and 1.0.2 (CVE-2014-0160).&lt;/p&gt;&#xA;&lt;p&gt;Details of the bug are available here: &lt;a href=&#34;http://heartbleed.com/&#34;&gt;The Heartbleed Bug&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;You can check you website here: &lt;a href=&#34;http://filippo.io/Heartbleed/&#34;&gt;Heartbleed test&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Details and update instructions from the websites of your Linux vendor of choice:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://aws.amazon.com/amazon-linux-ami/security-bulletins/ALAS-2014-320/&#34;&gt;Amazon Linux AMI&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://rhn.redhat.com/errata/RHSA-2014-0376.html&#34;&gt;Red Hat&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://www.ubuntu.com/usn/usn-2165-1/&#34;&gt;Ubuntu&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;On Ubuntu the update is simply done by executing these commands:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;sudo apt-get update&#xA;sudo apt-get upgrade&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;The following command shows (after an upgrade) all services that need to be restarted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nginx SSL website</title>
      <link>https://janikvonrotz.ch/2014/04/03/nginx-ssl-website/</link>
      <pubDate>Thu, 03 Apr 2014 07:54:04 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/03/nginx-ssl-website/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9408793&#34;&gt;https://gist.github.com/9408793&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;This best practice shows you the most advanced SSL configurations for your Nginx website.&#xA;For productive usage it&amp;rsquo;s recommended to use only public-signed certificates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Node.js Nginx proxy website</title>
      <link>https://janikvonrotz.ch/2014/04/02/node-js-nginx-proxy-website/</link>
      <pubDate>Wed, 02 Apr 2014 06:52:03 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/02/node-js-nginx-proxy-website/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9407504&#34;&gt;https://gist.github.com/9407504&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;It&amp;rsquo;s recommanded to publish a Node.js application with a Nginx proxy website.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Get a free verified SSL certificate from StartSSL</title>
      <link>https://janikvonrotz.ch/2014/03/26/get-a-free-verified-ssl-certificate-from-startssl/</link>
      <pubDate>Wed, 26 Mar 2014 10:29:07 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/26/get-a-free-verified-ssl-certificate-from-startssl/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9430791&#34;&gt;https://gist.github.com/9430791&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;SSL certificates aren&amp;rsquo;t cheap. You can create them on your own for private use.&#xA;However for internet use you have to get a verified certificate.&lt;/p&gt;&#xA;&lt;p&gt;Luckily there&amp;rsquo;s &lt;a href=&#34;https://www.startssl.com/&#34;&gt;https://www.startssl.com/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;They offer you a class 1 SSL certificate for free. Their site might not look trustworthy, but I&amp;rsquo;m quite shure they do a great job.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SSH and network hardening</title>
      <link>https://janikvonrotz.ch/2014/03/21/ssh-and-network-hardening/</link>
      <pubDate>Fri, 21 Mar 2014 18:19:12 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/21/ssh-and-network-hardening/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9346641&#34;&gt;https://gist.github.com/9346641&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;requirements&#34;&gt;Requirements&lt;/h1&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://janikvonrotz.ch/2014/03/13/deploy-ubuntu-server/&#34;&gt;Ubuntu server&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;instructions&#34;&gt;Instructions&lt;/h1&gt;</description>
    </item>
    <item>
      <title>Step by Step: Install Ghost Blog</title>
      <link>https://janikvonrotz.ch/2014/03/03/step-by-step-install-ghost-blog/</link>
      <pubDate>Mon, 03 Mar 2014 16:34:55 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/03/step-by-step-install-ghost-blog/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Latest Version of this guide: &lt;a href=&#34;https://gist.github.com/8542013&#34;&gt;https://gist.github.com/8542013&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;Finishing this guide you&amp;quot;ll get:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;A running Ghost installation&lt;/li&gt;&#xA;&lt;li&gt;Amazon SES mail configuration&lt;/li&gt;&#xA;&lt;li&gt;Simple ssh hardenings&lt;/li&gt;&#xA;&lt;li&gt;Nginx proxy&lt;/li&gt;&#xA;&lt;li&gt;Node.js configured with forever&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Specification of latest running installation:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Date: 21.01.2014&lt;/li&gt;&#xA;&lt;li&gt;OS: Ubuntu 64 bit - 12.04.4 LTS&lt;/li&gt;&#xA;&lt;li&gt;Provider: Amazon EC2&lt;/li&gt;&#xA;&lt;li&gt;Mail service: Amazon SES&lt;/li&gt;&#xA;&lt;li&gt;Browser: Google Chrome - 31.0.1650.63&lt;/li&gt;&#xA;&lt;li&gt;Ghost: 0.4&lt;/li&gt;&#xA;&lt;li&gt;Node: 0.10.24&lt;/li&gt;&#xA;&lt;li&gt;npm: 1.3.21&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Manage Security Groups in a organizational Strcture</title>
      <link>https://janikvonrotz.ch/2013/10/28/manage-security-groups-in-a-organizational-strcture/</link>
      <pubDate>Mon, 28 Oct 2013 16:22:20 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2013/10/28/manage-security-groups-in-a-organizational-strcture/</guid>
      <description>&lt;p&gt;As in on of my last &lt;a title=&#34;Manage ActiveDirectory Distribution Groups&#34; href=&#34;https://janikvonrotz.ch/2013/08/27/manage-activedirectory-distribution-groups/&#34;&gt;post&lt;/a&gt; I&amp;rsquo;ve showed you my approach to manage distribution groups in the hierarchical structure of an ActiveDirectory installation. In the mean time I&amp;rsquo;ve adapted a similiar approach for the security groups.&lt;/p&gt;&#xA;&lt;p&gt;Here is an example of the structure:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
