tag:blogger.com,1999:blog-52635560431550551712023-11-16T08:23:38.862+02:00Tech Newsmartin-white.blogspot.comMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.comBlogger69125tag:blogger.com,1999:blog-5263556043155055171.post-77459298874947197242021-12-05T07:37:00.007+02:002021-12-05T18:51:04.655+02:00Raspberry Pi Zero W 2 as a Desktop This is an update to my last post using the newly launched Pi 2 W, where I previously tried to setup a Pi Zero W as a desktop computer with a custom desktop environemnt based on Raspberry Pi OS Lite and IceWM. Pi Zero as desktopWith the launch of the new Raspberry Pi Zero W 2, the processing power of the tiny Raspberry Pi 2 W has been upped from a single core to a quad core CPU. The Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-7956896312935471962021-04-18T06:04:00.024+02:002022-06-25T01:13:32.771+02:00£10 Raspberry Pi Zero Desktop Computer SetupLooking at my Raspberry Pi Zero and maybe being partially inspired by the now defunct "One Laptop Per Child" project from a few years ago, which aimed at building a laptop for under $100, I wondered if a usable computer could be created out of the Raspberry Pi Zero. Or maybe it's just the challenge of seeing how far this tiny computer can be pushed that had me wondering whether this was even Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-76748360884370454752011-10-20T21:53:00.001+02:002011-10-20T21:53:33.822+02:00Search FailMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-7210003301806256142011-09-06T15:55:00.000+02:002011-09-06T15:55:23.039+02:00A7-Insecure Cryptographic StoragePart seven of the series detailing the OWASP top 10 web application vulnerabilities with a focus on password hashing. (See intro)
"Insecure cryptographic storage" relates to a number of aspects, but I think that it can be broken down to two main areas: Encryption and Hashing.
As these are similar in some respects and are often both used together, there's a bit of confusion around what they are.Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-71607999186485169782011-08-21T23:09:00.000+02:002011-08-21T23:09:58.437+02:00Mitnick vs AnonymousThere seems to be an amusing correlation between the history of the fight between Kevin Mitnick and Tsutomu Shimomura as portrayed in the movie Takedown and the goings on with Anonymous and HBGary. In the same way as the "expert", Shimomura, was hacked by Mitnick, HBGarry was hacked a while ago after annoying the group. By means of getting in through the company website via an SQL injection Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-45346250046879647682011-07-24T02:25:00.000+02:002011-07-24T02:25:48.502+02:0030 days with ubuntuHere's an excellent series of articles on an "average" Windows user, trying out Ubuntu Linux for the first time. I think his experience closely mirror many others, including mine. This was just one person's experience but I think his final conclusions may give interested people some perspective on the OS.
http://www.pcworld.com/businesscenter/article/229187/Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-3150932646397742062011-06-10T10:38:00.000+02:002011-06-10T10:38:04.993+02:00Watch Starwars in TerminalTo watch the Star Wars movie in a terminal, type the following and hit enter
(Works in Linux, Windows and probably Mac as well.)
telnet towel.blinkenlights.nl
Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-24578210198821675052011-06-02T23:05:00.000+02:002011-06-02T23:05:16.128+02:00Windows 8 previewFinally, Microsoft seems to making headway with Windows 8 and it seems to be heavily influenced by the Windows Phone 7 interface. A video has been released which showcases some of the new features and it looks pretty awesome. It's very different to the usual start menu/ windows/ desktop environment which has been around since windows 3.11.
It quite obviously has to compete with the Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-71946470894485267992011-05-17T15:22:00.001+02:002011-09-06T15:56:58.508+02:00OWASP Security Series.I've recently come across the OWASP (The Open Web Application Security Project) and it's really opened up my eyes. http://www.owasp.org/index.php/Main_Page
According to their website:
"Our mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-10461663980559172472011-05-17T15:17:00.000+02:002011-05-17T15:20:02.047+02:00A4: Insecure Direct Object ReferencesPart four of the series detailing the OWASP top 10 web application vulnerabilities. (See intro)
On the surface of it, this might seem to have something to do with class type objects, but actually, it doesn't... So what are we talking about?
Well, the sort of objects we're talking about here are files, directories, database records or primary keys.
I find that using a specific example is the Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-74749474598701542512011-05-11T00:36:00.000+02:002011-05-11T01:26:59.513+02:00Microsoft skype purchase a good idea?Microsoft has just announced that it will purchase Skype for $8.5bn.
On the surface of it it seems as though it's a great purchase with possible integration with Xbox, Windows Phone 7, Live.com etc. But has it come at too high a cost?
In 2009, 70% of Skype was sold for $2bn. 2 years later, it's bought for $8.5bn? I doubt that Skype's value has increased to the degree which justifies the price Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-68736693368588636592011-04-19T11:54:00.000+02:002011-05-11T01:22:39.301+02:00AubergineI know a bit random - but a weird/funny take on the new Ubuntu colour. (Not that it actually has anything to do with Ubuntu though...)
Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-56398055045419736932011-04-19T11:04:00.000+02:002011-05-11T01:26:59.514+02:00Software Piracy in SA"South African software industry players are pushing for changes in legislation to help reduce piracy"
http://mybroadband.co.za/news/software/19277-Fighting-Piracy-with-the-law.html
Is there much of a point? The industry moves faster than law can keep up. Back in 2002 the Electronic Communications and Transactions Act came into being. Prior to the ECT act, there were virtually no laws Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-49257246294200948142011-04-19T03:02:00.000+02:002011-04-19T03:02:07.545+02:00Filtered Dropdown Fields in InfoPathI faced an interesting question recently in building SharePoint based InfoPath forms. The problem was that a drop down field was being populated from a SharePoint list which could potentially have 50+ values, making the control cumbersome to use. The aim was to filter the values in the drop down based on another drop down field where there was a relationship between the two.
So how do you buildMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-65298849728355522282011-04-07T14:45:00.000+02:002011-05-11T01:24:14.363+02:00Gnome 3 Availible!Gnome 3 has finally been launched after what seems like years! So long in fact that Canonical/Ubuntu has decided to drop it from their upcoming version. But even if you don't want to wait for the major editions to release it in their next versions, you can install it right now.This is probably one of the biggest changes to the Gnome interface for the past few years, so it's a big change.Have a Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-57864451070858453022011-03-28T12:34:00.001+02:002011-05-11T01:24:26.880+02:00HP vs MicrosoftI came upon an interesting article this morning about HP presenting the Linux based WebOS which it acquired when buying Palm Computing as its future and "dumping Microsoft Windows.http://mybroadband.co.za/news/business/19279-HPs-bold-move.htmlNot that WebOS is new, or that Windows is going to be totally left out in the cold, but it certainly seems to have a slightly higher profile now. So, it's Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com2tag:blogger.com,1999:blog-5263556043155055171.post-29075291802061037862011-02-25T19:46:00.000+02:002011-05-11T01:17:51.594+02:00A5: Cross-Site Request Forgery (CSRF)This is part five in a list of articles in which I'm detailing the OWASP Top 10 vulnerabilities. (see intro)What is Cross-Site Request Forgery? Cross-Site Request Forgery, one-click attack, session riding or XSRF is an attack whereby unauthorised commands are transmitted from a user that exploits the trust that a site has in a user's browser. This is also known as a confused deputy attack againstMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-11255985843983578492011-01-10T00:18:00.000+02:002011-01-11T00:11:44.740+02:0064-bit virtualized guest on a 32-bit host???I've had to set up a SharePoint 2010 Virtual machine for upcoming projects. The problem is that SharePoint 2010 requires Windows 2008 server 64bit.OK, no problem... I've got a 64 bit machine. Hmmm.... But at the time of reformatting my machine I didn't have the 64-bit Ubuntu with me, so I installed the 32 bit.So... the question is can you install a 64 bit guest on top of a 32 bit host? Yes! Well,Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com4tag:blogger.com,1999:blog-5263556043155055171.post-610324466728059252011-01-07T01:35:00.002+02:002011-08-30T09:36:41.183+02:00Ubuntu vs KubuntuIn my review of Kubuntu 10.10, I closed in saying that I probably wasn't going to keep it for very long. There seemed to be a few bugs in the UI, with some of the windows tearing. But I got used to most of the small idiosyncrasies and liked some of the features. So, I ended up running it for about 3 months. I've just reinstalled Ubuntu 10.10 on my main laptop and have once again feel much more atMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com3tag:blogger.com,1999:blog-5263556043155055171.post-38613800040943114732011-01-04T13:28:00.001+02:002011-05-11T01:26:59.515+02:00Stones to grant immortality! Money back Guarantee!I've got some stones that I've found in my garden which are guaranteed to grant you immortality! And furthermore, I'll give you a 100% money back guarantee!Yeh.... WHATEVER!Power Balance Australia has been forced to admit that their product is a scam: "The Australian Competition and Consumer Commission (ACCC) has orderedPower Balance Australia to refund all customers who feel they weremisled by Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-59844737349757250602011-01-03T15:14:00.001+02:002011-05-11T01:19:00.115+02:00OWASP A1 - SQL InjectionThis is part one of the series detailing the OWASP top 10 web application vulnerabilities. (See intro)http://xkcd.com/327An SQL Injection attack is a type of code injection attack where an attacker exploits a vulnerability in the database layer of an application. This can occur when user input is incorrectly filtered for escape characters. Serious system damage can be suffered such as lost data Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-22363474470930101922010-12-09T11:26:00.001+02:002011-05-11T01:19:26.008+02:00OWASP A2 - Cross Site ScriptingThis is part two in a list of articles in which I'm trying to detail the OWASP Top 10 vulnerabilities. (see intro)What is Cross Site Scripting? Cross Site Scripting or XSS is an attack on a website in which an attacker sends text based attack scripts which are executed within the browser. Apparently about 80% of all security vulnerabilities were as of the result of XSS. link This means that theyMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-36957422051701266072010-12-07T14:54:00.001+02:002011-05-11T01:26:59.515+02:00Cell C Huawei E1820 HSPA+ Kubuntu 10.10Last month I got an horrendous bill for my Internet usage even though I use it very sparingly when connected via mobile. So, I decided that it was time to get a decent connection while on the road. Looking around, there's a fantastic special from Cell C in South Africa. It works out to be 5c/ MB. which is much cheaper than any of the current offerings. There are currently 2 options - the 7.2 and Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com0tag:blogger.com,1999:blog-5263556043155055171.post-63546725465848420712010-10-30T06:33:00.001+02:002011-05-11T01:30:35.369+02:00Legacy is a hard thing to shake!Once again for the thousandth time I've heard someone say "Linux is hard... bash, cron, scripts, emacs, python. bla...bla...bla ...". No matter how much I try, I can't seem to get people to believe me that Ubuntu Linux is easier to use than other OS's. In the recent Ubuntu releases, they've worked perfectly on my hardware - takes 10 minutes in install now and drivers are a non-issue. You don't Martinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com1tag:blogger.com,1999:blog-5263556043155055171.post-78325040960595320752010-10-20T13:28:00.000+02:002011-05-11T01:30:35.370+02:00Kubuntu 10.10 reviewI took the plunge... After working solely on Ubuntu for over a year, I decided to install the latest Kubuntu on my main laptop. I've never really worked with KDE much apart from trying it out briefly here and there but never ended up sticking with it as it was always installed on a secondary machine. So, why did I decide to swap? I've have had a few difficulties with KDE before and it seemedMartinhttp://www.blogger.com/profile/17412071363623395697noreply@blogger.com2