Categories
CyberSecurity

App Privacy

I was going to write about something completely different today but sometimes life kicks you in one direction and you just have to keep going. Yesterday I was very excited to receive my new video lights! They do some pretty fantastic stuff including changing to millions of colors, building effects, light grouping I was so […]

Categories
CyberSecurity

The TSA and “security”

If you want an example of the worst security in the world, look no further than the TSA. This isn’t a statement out of spite or malice, they do actually have the worst security of any large organization I’ve ever seen. Consider if you will what the TSA is known for, securing airports. What kind […]

Categories
CyberSecurity

Global Awareness

Last week Belgium was hit with one of the largest DDOS attacks in history. It took down the Belgium government along with most of the rest of the country’s internet. Now, over a week later, the news has been strangely silent about it. The most likely culprit is the Chinese government. Belgium is the home […]

Categories
CyberSecurity Shell Scripting Uncategorized

Securing your script

Figuring out how to secure your shell script can be difficult. One of the great advantages to using a language such as PHP is some of the security items are already built into the functions you use. Many people believe this makes PHP more secure; however the same amount of security can be achieved with […]

Categories
Linux Nix Shell Scripting Unix

Loopy scripts!

Learning how to use a loops in any language is the WOW point for most people. That moment when they go from “I don’t see the point in this” to “I can use this to rule the world.” Most programing languages have three loops and they are similar or identical in what they do and […]

Categories
Shell Scripting

Bash programers should read more

One of the most misunderstood commands in bash is read. I consider this a shame because it’s one of the most useful. I was reminded of this recently when someone asked me to look over a shell scripting manual they had written. When I came to the read command there was less than a page […]

Categories
Shell Scripting

Shell scripting and the Pipe

Pipe may be the most useful tool in your shell scripting toolbox. It is one of the most used, but also, one of the most misunderstood. As a result, it is often overused or misused. This should help you use a pipe correctly and hopefully make your shell scripts much faster and more efficient. Most […]

Categories
Shell Scripting

Advanced Conditionals in BASH

Conditionals are one of the most misunderstood parts of bash scripting. In a programing language you use an `if` statement. This is normally one of the internal functions of the language and it starts with the statement and moves to the expression. Begin them like this: C, PHP : if (expression) Go, python, ruby: if […]

Categories
CyberSecurity

What is DevOps/DevSecOps (or more to the point, what it is not)

I recently had a conversation with a CISO at a major automobile manufacturing company who uses a DevSecOps strategy and so I started inquiring about it. What I discovered was a definition of DevOps which was terribly unsecure. I later asked around and I discovered this was not a single case, most companies who claim […]

Categories
System Administration

I received an error, now what?

We see them all the time: error messages. They are in our logs, in our monitoring and in our applications. We receive them so often we’ve become immune to them. We even have names for alerts errors we ignore such is known, false or phantom. This is one of the biggest problems with software today. […]