Ever tried running your own Certification Authority (CA)? With OpenSSL – it’s not as complicated as you think, though thanks to the lack of decent documentation, there are a few pitfalls. This article walks you through the basics of setting up OpenSSL to run a CA that can sign other end entity certificates.
It turns out that attempting to revive old electronics from your childhood can be somewhat therapeutic. With that in mind, I decided to rescue the old NES that had been collecting dust in the garage for many years and see if it would still boot. Unfortunately… It did not.
For some reason, Microsoft decided not to make the following patch critical, or even make it easy to find – it’s the very first patch you should install before attempting to update Windows 7\2008 after a clean install – KB3102810 resolves the stupid “Checking for updates” taking a whole day.
Just when you had given up on being a kid and finally started to grow up as you’ve been told so many times before – not one but TWO roller-coaster simulation games come into your life. What an exciting time to be alive!
Despite Adobe’s best efforts to flog a dead horse, Flash still seemed to hold firm in 2015. But has lost some important allies along the way – namely YouTube and Chrome support, however some high profile sites such as the BBC still refuse to let it go.
SSL\TLS provides two lovely features we can’t get enough of these days; authentication, and encryption.
I’ve been working on a crappy little project to make file sharing much easier in environments where CIFS\SMB permissions are absolute hell. I know it somewhat overrules many security concerns, but the environment I’m referring to is a lab, so it’s OK.
Because I’ve had such a hard time finding a decent example of manipulating the Windows Firewall using C# online, I’ve decided to paste a small portion of code that might help others in such matters. Below is an example of how to determine the Windows Firewall state using C# and the modern INetFwPolicy2 interface, rather than the older INetFwMgr examples that seem to be around.
For you paranoid folk out there who went ahead and microwaved every physical media device possible shortly after TrueCrypt went down the toilet, there’s hope yet again! VeraCrypt has reached a stage of maturity where it no longer suffers from some of the woes of its predecessor from which it was forked.
If you’re one of the many people who took the free upgrade option for Windows 10, you probably have the remains of a Windows 8 installation lurking about your hard drive, slowly getting in the way and causing all kinds of stupid things to happen. Windows 10 may be a slight improvement, but Microsoft has never been good at upgrades, and could have made life much easier if the installation just wiped the damn thing.