Implementing HTTPS and HTTP Headers in Nginx

There’s been a lot of focus on internet security and encryption over the past several years. You’ll find dozens of news reports every day about companies getting breached, individuals having their bank accounts compromised, and security researchers finding vulnerabilities in web services and encryption protocols. As someone who is passionate about security and technology, I’ve been driven to keep up with current standards and implement best practices so that I don’t become victim to preventable vulnerabilities. Read On →

The Current State of DevOps and the Agile Movement in Japan

Last Friday I was fortunate enough to attend a seminar at Creationline, Inc. in the Akihabara district of Tokyo. The topic, as you may have already figured out, was on the current state of DevOps and the Agile Movement in Japan. I’ve been interested in learning more about how software development and projects are managed in Japan. Some of the speakers included Ippei Suzuki from Creationline, Inc., Hiroaki “bucci” Kawabuchi from CI&T and Tsuyoshi Ushio from Microsoft. Read On →

Installing Go (Golang) on Ubuntu 16.04 LTS

Google’s Go programming language has has been on my list of programming languages to learn for the past year or so. I’ve attended about half a dozen conferences in the past two years and there’s at least one presenter showing what they’ve done with language. There’s a lot of companies, besides Google, that are using Go in production. What makes Go different is that Go doesn’t have classes. That means it’s not a real object oriented language. Read On →

Visualizing Threats and Preventing Intrusions: Part 2

Network intrusions are an incredibly common occurrence that happens just about every single second on high traffic web servers. With the increasing popularity of cloud based systems, the entire range of IP addresses owned by the provider are constantly scanned and checked for vulnerabilities and poor security configurations. This can be replicated by creating a new VPS (Virtual Private Server) instance on a cloud hosting provider, such as Digital Ocean or Amazon AWS. Read On →

An Introduction to the Ext4 Filesystem

A filesystem is a way in which binary data is organized on disk using a set of data structures and other programming methods to handle file and hardware properties. An operating system is formatted to a certain filesystem and thus logically organized using a directory structure or the location where files are stored. These properties include but are not limited to metadata, which is information about a file such as its filename, the directory in which it is located, permissions, creation date, along with other information as needed. Read On →

Packet Capture Analysis of Ransomware

In the 2016 Data Breach Investigation Report, Verizon discovered that “ransomware is on the rise”. Malware crafted to encrypt the victim’s drive content, in lieu of a hefty Bitcoin payment to unlock the protected files, encompasses 39% of crimeware incidents in 2015. Hackers primarily targeted the public sector, manufacturing, and information industries. What makes ransomware so easy to deploy is the minimal skill set required to craft an executable file masked as something else, such as a gif or flash object. Read On →

Visualizing Threats and Preventing Intrusions: Part 1

For many years small and medium businesses would go unprotected and unaware of the dangers they face, leaving their web servers and private data susceptible to compromise. Sifting through thousands of lines worth of log data was often very tedious and difficult to accomplish without having a dedicated, well trained, technically apt staff to decipher event information. There was no proper way of incorporating log feeds from across multiple hosts into a central repository for event handling and interpretation. Read On →

The Relationship Between Incident Response and Risk Management

The relationship between Risk Management and Incident Response is an essential partnership between the technical and business aspects of an organization. In the past twenty years we’ve relied on technology to make businesses more efficient, but only the past decade or so has shown that protecting informational assets is equally important to incorporate within a business’ technology operations. How they work together is really the substructure to the relationship as both are required for efficient fortuitous operation. Read On →

Integrating Smartwatches into Daily Life

I’m likely going to pick up an Apple Watch Sport, 42mm, Space Grey. I think the system is possibly more catered to users that want something that works out of the box, without having to go into multiple settings and permissions. We’ll see how this pans out and hopefully it’ll be the last time I exchange smartwatches. The one big disadvantage to the the Moto 360, perhaps isolated to my own personal device, is the non-functioning Google Maps app on the smartwatch. Read On →

Setting up E-Mail on Digital Ocean using Zoho Mail

Setting up email for a new domain can be challenging, especially when you’re using VPS hosting. There’s many options, such as installing your own mail server and storing all the emails contents on your server or using a service such as Google Apps or Zoho. They both include mail services that only require you to modify several DNS settings for your domain. The benefit of hosting your own mail server is the absolute control you have over the files and email contents, as well as the ability to create new features or modify existing ones if you’re a software developer. Read On →