Blog / Security

Opportunistic TLS

March 21, 2009

We had to upgrade our mail gateway/anti-spam software on Sunday because one of our vendors requires us to use encryption when exchanging emails with them. The easiest solution is to use opportunistic TLS, where the server will always try to connect to the other server using the TLS protocol. If the other server supports TLS, then traffic is encrypted. If not, then the email is sent using just regular SMTP without encryption.

This is actually …

RSA SecurID 3.0.2 for BlackBerry

March 16, 2009

My colleague informed me earlier that RSA just released this new version of their SecurID software for BlackBerry sometime last month. I installed it right away on my BlackBerry 8330 with OS v4.5.0.131 and it finally worked!!! I’ve been trying to get their software to work on my BlackBerry since last year but my OS wasn’t supported.

This new version also now supports RIM OS version 4.7, so if you have a BlackBerry Storm this …

IIS Security Scan: The remote service supports the use of weak SSL ciphers

January 27, 2009
Synopsis: The remote service supports the use of weak SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer either weak encryption or no encryption at all. See also : http://www.openssl.org/docs/apps/ciphers.html Solution: Reconfigure the affected application if possible to avoid use of weak ciphers. Risk Factor: Medium / CVSS Base Score : 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) Plugin output : Here is the list of weak SSL ciphers supported by the remote server …

Untangle Network Gateway

January 3, 2009

Another great open source software.

Untangle is basically a Unified Threat Management (UTM) solution designed for SMBs (up to about 300 users, although there are people who have successfully deployed it in much bigger environments, like this one, for example, with 1600+ users). Untangle packaged all these great open source security software together and then provided a really nice and very intuitive user interface for them simplifying installation and management. They also have commercial …

How to encrypt HTTP traffic (and bypass most firewalls) using SSH Tunneling with PuTTY on Windows

September 4, 2008

I’ve been using SSH Tunneling for a while now mainly to encrypt HTTP traffic when using public wireless access points. I won’t go into detail here, just Google for “SSH Tunneling” if you need more information. I’m also gonna assume you already have an SSH Server set up.

  • Download PuTTY and save it to C:/.
  • Open notepad, type in the command below and save it as securetunnel.bat (Note: removeusername@ and -pw passwordif you prefer to …