Pthree - pthree.org - Aaron Toponce

Latest News:

RIP Microsoft Tag 20 Aug 2013 | 04:42 pm

So yesterday, Microsoft announced that it is ending support for Tag, (on Facebook?) it’s proprietary barcode format. To me, this doesn’t come as a major surprise. Here’s why: Tag arrived very late in...

The NSA and Number Stations- An Historical Perspective 20 Jun 2013 | 10:49 am

With all the latest news about PRISM and the United States government violating citizen’s 4th amendment rights, I figured I would throw in a blog post about it. However, I’m not going to add anything ...

OpenSSH Keys and The Drunken Bishop 30 May 2013 | 07:34 pm

Introduction Have you ever wondered what the “randomart” or “visual fingerprint” is all about when creating OpenSSH keys or connecting to OpenSSH servers? Surely, you’ve seen them. When generating a k...

Strengthen Your Private Encrypted SSH Keys 27 May 2013 | 08:21 pm

Recently, on Hacker News, a post came through about improving the security of your encrypted private OpenSSH keys. I want to re-blog that post here (I’m actually jealous he blogged it first), in my ow...

ZFS Administration, Appendix B- Using USB Drives 9 May 2013 | 05:00 pm

Table of Contents Zpool Administration Install ZFS on Debian GNU/Linux VDEVs RAIDZ The ZFS Intent Log (ZIL) The Adjustable Replacement Cache (ARC) Exporting and Importing Storage Pools Scrub and Resil...

Password Attacks, Part III- The Combination Attack 22 Apr 2013 | 11:31 am

Introduction It’s important to understand that most of the password attacks to offline databases where only hashes are stored are extensions of either the brute force attack or the dictionary attack, ...

ZFS Administration, Appendix A- Visualizing The ZFS Intent LOG (ZIL) 19 Apr 2013 | 04:00 pm

Table of Contents Zpool Administration Install ZFS on Debian GNU/Linux VDEVs RAIDZ The ZFS Intent Log (ZIL) The Adjustable Replacement Cache (ARC) Exporting and Importing Storage Pools Scrub and Resil...

Password Attacks, Part II – The Dictionary Attack 17 Apr 2013 | 06:00 pm

Introduction Before we start delving into the obscure attacks, it probably makes the most sense to get introduced to the most common attacks. The dictionary attack is one such attack. Previously we ta...

Password Attacks, Part I – The Brute Force Attack 16 Apr 2013 | 05:00 pm

Introduction For those who follow my blog know I have blogged about password security in the past. No matter how you spin it, no matter how you argue it, no matter what your opinions are on password s...

Please Consider A Donation 11 Apr 2013 | 07:59 am

I just received an anonymous $5 donation via PayPal for my series on ZFS. Thank you, whomever you are! I’ve received other donations in the past, and never once have I had a donation page or ads on th...

Related Keywords:

mozilla lightning, mecard, aptitude vs apt-get, alternatives to ubuntu, git create repository, ubuntu toponce, perl recursion, aron t-61, how to speed up hdd shred, i never use my ipad

Recently parsed news:

Recent searches: