<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1489897032337705045</id><updated>2026-04-08T05:22:31.200-05:00</updated><category term="key management"/><category term="Trust"/><category term="malware"/><category term="complexity vs security"/><category term="identity management"/><category term="software security"/><category term="Marketing FUD"/><category term="crypto"/><category term="physical security"/><category term="research"/><category term="whole disk encryption"/><category term="open source"/><category term="PCI"/><category term="design"/><category term="education"/><category term="humor"/><category term="privacy"/><category term="DIY"/><category term="anonymity"/><category term="security economics"/><category term="Digital Rights Management"/><category term="content filtering"/><category term="opt-in security"/><category term="penetration testing"/><category term="separation of code and data"/><category term="active directory"/><category term="history"/><category term="risk"/><title type='text'>Securology</title><subtitle type='html'>&lt;B&gt;(noun) securology.&lt;/B&gt;&#xa;&lt;I&gt;Latin: se cura logia&lt;/I&gt;&lt;BR&gt;&#xa;Literally translated: &lt;i&gt;the study of being without care or worry&lt;/i&gt;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://securology.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>138</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-7622911261235059399</id><published>2014-09-08T00:00:00.000-05:00</published><updated>2015-09-08T20:23:43.498-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PCI"/><title type='text'>PCI and Retailer Breaches</title><content type='html'>Just a quick thought in the absence of meaningful thoughts on here ...&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
When Target was breached at the end of 2013 (and every day since then), from the safety of their climate controlled armchairs, pundits have cast judgement on Target. &amp;nbsp;&quot;Target was negligent.&quot; Or maybe &quot;Their PCI QSA wasn&#39;t thorough.&quot; &amp;nbsp;Sentiments along those lines ...&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Now, here comes The Home Depot&#39;s breach. &amp;nbsp;Same malware. &amp;nbsp;Same techniques. &amp;nbsp;Quite possibly orders of magnitude higher in scope than Target (time will tell). &amp;nbsp;The same ol&#39; drums will beat from smart phones and tablets in living rooms everywhere.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The reality is ... It&#39;s very difficult. &amp;nbsp;Difficult to get security &quot;correct.&quot; &amp;nbsp;And more difficult to keep it in that &quot;correct&quot; state over time. &amp;nbsp;A single chink in the armor, so the ol&#39; stitch goes ...&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
For the self-acclaimed pundits who throw rocks in glass houses, consider this:&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Every single Level 1 merchant that has been breached has signed RoCs (Reports on Compliance) signed by both a third party and representatives of the credit card brands.&lt;/blockquote&gt;
&lt;br /&gt;
Now for the realistically jaded perspective: PCI is really just about transferring risk to merchants and away from the card brands. &amp;nbsp;That&#39;s it. &amp;nbsp;Does it work? &amp;nbsp;Sure it does, since consumers are still using credit cards at merchants, and the economy hums along.&lt;br /&gt;
&lt;br /&gt;
That is all ...</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/7622911261235059399/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/7622911261235059399' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7622911261235059399'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7622911261235059399'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2014/09/pci-and-retailer-breaches.html' title='PCI and Retailer Breaches'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-2269009339289042158</id><published>2014-01-22T00:00:00.000-06:00</published><updated>2015-09-08T20:58:23.078-05:00</updated><title type='text'>Top Posts Since 2007</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioowTSKiaR4zySexK0-MnW01ejvFsgeQJneMo80o6Alx5lMXnFkQuLMjuoWlMLPcUp5Ez8NPHEvAU5e9t36vXaMpZn-9VZrIIxhfFQqbq4NkcYDYgByDqhqQ7YRhKm2lQk_mlWLKExH8ci/s1600/stopwatch2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioowTSKiaR4zySexK0-MnW01ejvFsgeQJneMo80o6Alx5lMXnFkQuLMjuoWlMLPcUp5Ez8NPHEvAU5e9t36vXaMpZn-9VZrIIxhfFQqbq4NkcYDYgByDqhqQ7YRhKm2lQk_mlWLKExH8ci/s1600/stopwatch2.jpg&quot; /&gt;&lt;/a&gt;It&#39;s time to give the blog a little push. &amp;nbsp;It&#39;s been 7 years with spurts of on again off again contributions all over the spectrum of security, from information security and privacy to physical security with smatterings of things like writing code and picking locks ... maybe even a theme of how politics can affect security policy decisions from time to time as well.&lt;br /&gt;
&lt;br /&gt;
Here are some of the top computer/information/application/software security highlights, many of which are top Google search hits as well:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Tried to explain &lt;a href=&quot;http://securology.blogspot.com/2007/10/trusted-vs-trustworthy.html&quot;&gt;the difference between Trust and Trustworthiness&lt;/a&gt;, for which the article is still a top Google hit.&lt;/li&gt;
&lt;li&gt;That article wasn&#39;t as good as &lt;a href=&quot;http://securology.blogspot.com/2012/08/classic-trust.html&quot;&gt;Ken Thompson&#39;s classic speech in 1984, though&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;There was the time &lt;a href=&quot;http://securology.blogspot.com/2007/10/pgp-whole-disk-encryption-barely.html&quot;&gt;PGP Corp didn&#39;t document a little feature that allowed a complete bypass of the whole disk encryption&lt;/a&gt;. &amp;nbsp;That got &lt;a href=&quot;http://securology.blogspot.com/2007/10/pgp-bypass-on-slashdot.html&quot;&gt;slashdotted&lt;/a&gt;. &amp;nbsp;Then there was some&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2007/10/response-to-jon-callas-pgp-encryption.html&quot;&gt;dialog with their CTO, Jon Callas&lt;/a&gt; about it. &lt;a href=&quot;http://securology.blogspot.com/2007/10/sorry-for-delay-jon.html&quot;&gt;Back&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2007/10/response-to-jon-callas-continued-2.html&quot;&gt;and forth&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Shortly after that, &lt;a href=&quot;http://securology.blogspot.com/2008/02/felten-destroys-whole-disk-encryption.html&quot;&gt;Ed Felten&#39;s PhD students smashed many whole disk encryption products&lt;/a&gt; and &lt;a href=&quot;http://securology.blogspot.com/2008/03/jon-callas-responds-to-ed-felten.html&quot;&gt;Jon Callas got involved again&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;All that disk encryption talk got everyone thinking about &lt;a href=&quot;http://securology.blogspot.com/2009/12/reality-of-evil-maids.html&quot;&gt;the realities of evil maids&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://securology.blogspot.com/2007/11/soft-tokens-arent-tokens-at-all.html&quot;&gt;RSA&#39;s SecurID soft tokens got picked apart, since they&#39;re not really tokens after all&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Years later, came the&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2011/03/rsa-securid-breach-initial-reactions.html&quot;&gt;&quot;told you so&quot;&lt;/a&gt; about the &lt;a href=&quot;http://securology.blogspot.com/2011/03/more-rsa-securid-reactions.html&quot;&gt;RSA &lt;/a&gt;&lt;a href=&quot;http://securology.blogspot.com/2011/03/rsa-securid-breach-seed-record-threats.html&quot;&gt;SecurID tokens.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Remember that&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2013/06/active-directory-tip-hitting-snooze-on.html&quot;&gt;nifty way to trick Active Directory into snoozing the password expiration for an account&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;Waxed eloquent (or so was tried) on&lt;a href=&quot;http://securology.blogspot.com/2007/09/separation-of-code-and-data.html&quot;&gt; the principles of separating code from data&lt;/a&gt;, and why exactly that is such a pivotal problem with software security.&lt;/li&gt;
&lt;li&gt;Wondered &lt;a href=&quot;http://securology.blogspot.com/2010/03/ssl-big-government-wheres-phil.html&quot;&gt;what happened to Phil Zimmerman&lt;/a&gt;&amp;nbsp;then found him at &lt;a href=&quot;http://securology.blogspot.com/2012/04/silent-circle.html&quot;&gt;Silent Circle&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;There was the time&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2008/12/stupidest-pci-requirement-ever.html&quot;&gt;&amp;nbsp;a PCI QSA did not understand how to manage encryption keys (DEK/KEK) with the slight of hand tricks that hinder ecommerce&#39;s operational efficiencies&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;In an effort to &quot;give back a little&quot; gave some&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2013/06/coding-for-active-directory.html&quot;&gt;code to interact with Active Directory in C#&lt;/a&gt;, like&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2013/06/coding-for-active-directory-quickly.html&quot;&gt;adding MS Exchange objects&lt;/a&gt;, &lt;a href=&quot;http://securology.blogspot.com/2013/06/coding-for-active-directory.html&quot;&gt;programmatically managing attributes on AD users and groups&lt;/a&gt;, even doing some very unique and complicated things like &lt;a href=&quot;http://securology.blogspot.com/2013/06/coding-for-active-directory-proxying.html&quot;&gt;programmatically proxying Active Directory users into AD-LDS&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;One time,&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2008/05/sending-bobby-tables-to-moon.html&quot;&gt;Little Bobby Tables went to the moon&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Discussed &lt;a href=&quot;http://securology.blogspot.com/2012/03/brute-forcing-credit-card-numbers.html&quot;&gt;brute forcing credit card numbers&lt;/a&gt;&amp;nbsp;when PCI allows you to keep a large percentage of the digits.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://securology.blogspot.com/2008/05/why-you-dont-need-web-application-layer.html&quot;&gt;Against Web Application Firewalls before it was cool&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;And maybe some people chose not to get&amp;nbsp;&lt;a href=&quot;http://securology.blogspot.com/2009/01/so-you-think-you-want-job-in-computer.html&quot;&gt;computer security jobs&lt;/a&gt;. &amp;nbsp;(Probably not ...)&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
It&#39;s been fun. &amp;nbsp;Here is to 7 more years!&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/2269009339289042158/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/2269009339289042158' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/2269009339289042158'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/2269009339289042158'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2014/01/top-posts-since-2007.html' title='Top Posts Since 2007'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioowTSKiaR4zySexK0-MnW01ejvFsgeQJneMo80o6Alx5lMXnFkQuLMjuoWlMLPcUp5Ez8NPHEvAU5e9t36vXaMpZn-9VZrIIxhfFQqbq4NkcYDYgByDqhqQ7YRhKm2lQk_mlWLKExH8ci/s72-c/stopwatch2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-8775821583336495064</id><published>2013-06-07T00:00:00.000-05:00</published><updated>2013-06-07T00:00:01.588-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="active directory"/><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><title type='text'>Random Password Generator Tool</title><content type='html'>Sure, there are lots of random password generators out there, but how many of them are integrated with our very feature-rich open source code repository of tools that will help you to code against Active Directory, while also standing alone as a simple quick to use tool for a helpdesk? &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHP8MJLylrG0rXOf9bkQAVUnNsxEkv4P8EtFgBfs4NViULhdcBqP0UqodpFkGCNeT5UZV1Inn8EDM2xt9-QFIIJRsKOJA01aFIU0tuRXmvNKXlvD6j1EEOBMCD7CPQ1BUc2APPBU1fYnWg/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHP8MJLylrG0rXOf9bkQAVUnNsxEkv4P8EtFgBfs4NViULhdcBqP0UqodpFkGCNeT5UZV1Inn8EDM2xt9-QFIIJRsKOJA01aFIU0tuRXmvNKXlvD6j1EEOBMCD7CPQ1BUc2APPBU1fYnWg/s1600/Untitled.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Yeah, that&#39;s right, only 1 random password generator tool does that. &amp;nbsp;Get it and its open source code now:&amp;nbsp;&lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/PasswordGenerator&quot;&gt;https://github.com/Securology/ActiveDirectoryServices/tree/master/PasswordGenerator&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/8775821583336495064/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/8775821583336495064' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8775821583336495064'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8775821583336495064'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/06/random-password-generator-tool.html' title='Random Password Generator Tool'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHP8MJLylrG0rXOf9bkQAVUnNsxEkv4P8EtFgBfs4NViULhdcBqP0UqodpFkGCNeT5UZV1Inn8EDM2xt9-QFIIJRsKOJA01aFIU0tuRXmvNKXlvD6j1EEOBMCD7CPQ1BUc2APPBU1fYnWg/s72-c/Untitled.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-4974827685194363401</id><published>2013-06-06T00:00:00.000-05:00</published><updated>2013-06-06T00:00:01.445-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="active directory"/><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><title type='text'>Coding for Active Directory: Quickly import Exchange Rooms or Resources</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI6Tsg0WRvJ_bGKi2GMuxm3caJzXEeeTk1w6L1hRdAXiwT2cB8tQ4X-TS0Zh9AIZzQh6JwL2h5nWNw9e_9YTx7wdsh48UPUQZasTWw_r2lyNrvIFs50kTE4_wNp2-Q5G4kMehQfp5BTPhf/s1600/exchange.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI6Tsg0WRvJ_bGKi2GMuxm3caJzXEeeTk1w6L1hRdAXiwT2cB8tQ4X-TS0Zh9AIZzQh6JwL2h5nWNw9e_9YTx7wdsh48UPUQZasTWw_r2lyNrvIFs50kTE4_wNp2-Q5G4kMehQfp5BTPhf/s200/exchange.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Do you have a copy of Visual Studio, a very rudimentary knowledge of C# .NET, and a need to import a list of &lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/ExchangeImportRooms&quot;&gt;Exchange Rooms&lt;/a&gt; or &lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/ExchangeImportResources&quot;&gt;Resources&lt;/a&gt; into your Active Directory?&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
If so, check out a couple very simple example apps that can import .CSV files to knock out this frequent task:&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices&quot;&gt;https://github.com/Securology/ActiveDirectoryServices&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/4974827685194363401/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/4974827685194363401' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/4974827685194363401'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/4974827685194363401'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/06/coding-for-active-directory-quickly.html' title='Coding for Active Directory: Quickly import Exchange Rooms or Resources'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI6Tsg0WRvJ_bGKi2GMuxm3caJzXEeeTk1w6L1hRdAXiwT2cB8tQ4X-TS0Zh9AIZzQh6JwL2h5nWNw9e_9YTx7wdsh48UPUQZasTWw_r2lyNrvIFs50kTE4_wNp2-Q5G4kMehQfp5BTPhf/s72-c/exchange.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-8120993542606801898</id><published>2013-06-05T00:00:00.000-05:00</published><updated>2015-09-08T19:23:24.662-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><title type='text'>Coding for Active Directory: Programmatically Get or Set Obscure Attribute Data in C#</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s1600/AD.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;143&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s320/AD.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
If you are an organization of any size, chances are you have an Active Directory instance sitting around, and maybe some level of additional investment in Microsoft products beyond Windows on client machines and a couple servers. &amp;nbsp;And the more investment you have, the more value you will get from having relevant data in your Active Directory. &amp;nbsp;You may even have some developers on staff that write applications in C# or VB .NET. &amp;nbsp;Chances are, though, your developers won&#39;t understand or even want to understand Active Directory. &lt;br /&gt;
&lt;br /&gt;
They may, however, be able and willing to code to a few random source code examples that float around on the web, but most examples are not very feature complete. &amp;nbsp;So it requires developers digging into the musty underbelly layers of Active Directory to learn how to get what they need. &amp;nbsp;Few will dig.&lt;br /&gt;
&lt;br /&gt;
You could purchase an API, but the licenses may be expensive, and you may only want to read or set a couple of attributes on a user or group object that nobody else seems to have documented how to do well enough to satisfy your developers.&lt;br /&gt;
&lt;br /&gt;
Or you could just send your developers to the new Securology GitHub repository to pull down a fully-functional, open source, non-restrictively licensed API to include in their projects to get up and going.&lt;br /&gt;
&lt;br /&gt;
Maybe you just dealt with a large scale AD migration and you need to peel back the layers and extract user or group SIDs (Security Identifiers) or validate that SIDs from previous domains on imported objects are properly stored in the SID History?&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://imgs.xkcd.com/comics/cell_number.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://imgs.xkcd.com/comics/cell_number.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Maybe you have a basic interface with your HR system, but don&#39;t want to shell out tons of cash to purchase a metadirectory tool like Identity Lifecycle Manager to move HR data like manager/reporting relationships around, but could really benefit from having that data in your Exchange, SharePoint or other application environments.&lt;br /&gt;
&lt;br /&gt;
Maybe you need to set the user&#39;s employee number from your HR system on each AD user to identify the authoritative data source to satisfy an Active Directory Audit.&lt;br /&gt;
&lt;br /&gt;
Maybe you just want to read or write the AD user&#39;s address, telephone, or even IP Phone number.&lt;br /&gt;
&lt;br /&gt;
Maybe you have a mixed environment that also contains Unix servers and you need to set Unix attributes on the IT Unix Admin user accounts for a Unix SSO to AD product that you&#39;re using.&lt;br /&gt;
&lt;br /&gt;
Maybe you&#39;d like to programmatically setup Microsoft Exchange or Lync (Office Communicator) attributes?&lt;br /&gt;
&lt;br /&gt;
Maybe you&#39;d like a safer way to programmatically move or delete Active Directory objects?&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV3XNKwyNbj5fNWex5OYGzf1MfcgCg7c_GxD-JXNPf8sn4OYMM2vpoy8-diu0JaATDAp1LRW0K6tlKlINvbFoErHpSlXG28mZJcF3pLxDUVfpHtcS1lVSFKGSVKa4cxMT4K1pr4pr2EfcG/s1600/code.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV3XNKwyNbj5fNWex5OYGzf1MfcgCg7c_GxD-JXNPf8sn4OYMM2vpoy8-diu0JaATDAp1LRW0K6tlKlINvbFoErHpSlXG28mZJcF3pLxDUVfpHtcS1lVSFKGSVKa4cxMT4K1pr4pr2EfcG/s400/code.JPG&quot; width=&quot;385&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Maybe you&#39;d like an easier way to programmatically add or remove a user from an AD group? &amp;nbsp;Or maybe check if they already are in that group?&lt;br /&gt;
&lt;br /&gt;
Maybe you&#39;d like to populate your AD with Contact objects for business partners who don&#39;t need user accounts in your domain or forest, but so that they&#39;ll still show up in the Global Address List (GAL)?&lt;br /&gt;
&lt;br /&gt;
Maybe you need a way to programmatically create an Organizational Unit (OU)?&lt;br /&gt;
&lt;br /&gt;
Maybe you&#39;d like to toggle an AD group from &quot;Security&quot; to &quot;Distribution&quot; and back again? &amp;nbsp;Or &quot;domain local&quot; to &quot;universal&quot;? &amp;nbsp;Or dump all of its members? &amp;nbsp;Or check if the AD group has no members? &amp;nbsp;Or set the &quot;owner&quot; of the group for audit/management purposes?&lt;br /&gt;
&lt;br /&gt;
Maybe you&#39;d like to prune back old computer objects? &amp;nbsp;Or build a report to show what Operating Systems are in your directory? &amp;nbsp;Or safely move or delete computer objects?&lt;br /&gt;
&lt;br /&gt;
Maybe you&#39;d like a way to expose the True Last Logon time of a user account without manually checking each Domain Controller and comparing times? &amp;nbsp;Or maybe you&#39;d like a nice multi-threaded (and fast!) way of checking all Domain Controllers simultaneously?&lt;br /&gt;
&lt;br /&gt;
If any of those are even remotely interesting to you, check out &lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/AccountManagement&quot;&gt;our extended version of Microsoft&#39;s System.DirectoryServices.AccountManagement namespace that we provide on GitHub&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/8120993542606801898/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/8120993542606801898' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8120993542606801898'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8120993542606801898'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/06/coding-for-active-directory.html' title='Coding for Active Directory: Programmatically Get or Set Obscure Attribute Data in C#'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s72-c/AD.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-7891665183234898029</id><published>2013-06-04T00:00:00.000-05:00</published><updated>2013-06-04T00:00:02.590-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="active directory"/><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><title type='text'>Coding for Active Directory: Proxying Users into an AD-LDS Application Directory</title><content type='html'>In another IT Pro tip related to Active Directory, suppose an organization has an internal AD forest, but has a company policy that only paid personnel are to have accounts in that directory. &amp;nbsp;That&#39;s a fairly rational policy:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s1600/AD.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;143&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s320/AD.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;If we pay you directly, then you&#39;re an employee, so you get an account&lt;/li&gt;
&lt;li&gt;If we pay you indirectly, then you&#39;re a contractor that we&#39;ve hired, so you can also get an account&lt;/li&gt;
&lt;li&gt;If you pay us, whether directly as a consumer, retailer, or reseller, or indirectly as a consumer through a retailer or reseller, then you&#39;re a customer, so you probably should not have an account in our internal AD forest.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
But suppose you have an application that needs to be built that will allow both employees/contractors, AND customers to access it, and you don&#39;t want to setup yet-another-provisioning process for granting and revoking access for employees and contractors?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Enter a common solution: Active Directory - Lightweight Directory Services (previously known as ADAM, AD Application Mode, a.k.a. an &quot;application&quot; directory). &amp;nbsp;This is a lightweight, LDAP only directory with less bells and whistles than AD has, but many Microsoft-centric applications can plumb right into it.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But to achieve a true Single Sign On for the internal AD users, the IT Admin must create either a UserProxy or a UserProxyFull object in the AD-LDS. &amp;nbsp;Both function nearly the same, but a UserProxyFull has additional schema data elements for storing additional contact data fields, which are generally handy for today&#39;s applications.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhorF2a90F0qEBZpfZZSDNdvT1P6WhBi-aQnzOlKw3WaOg_Mi9zb5Yf6tWM5HE4cMZ7m_t8zQ9z7JHt8CQToc7gaMFTM78MzI4R63brp0xgsm5QrZYd4CYeBSwLGLUUXD8_MTYUCj3g1aA1/s1600/code.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhorF2a90F0qEBZpfZZSDNdvT1P6WhBi-aQnzOlKw3WaOg_Mi9zb5Yf6tWM5HE4cMZ7m_t8zQ9z7JHt8CQToc7gaMFTM78MzI4R63brp0xgsm5QrZYd4CYeBSwLGLUUXD8_MTYUCj3g1aA1/s400/code.JPG&quot; width=&quot;375&quot; /&gt;&lt;/a&gt;Under the hood, when an internal AD user connects to the application, an authentication request is passed to the AD-LDS, which looks up the UserID of the internal user, finds the User Proxy object, and then performs Kerberos authentication against the internal AD. &amp;nbsp;All other attributes, though, from contact data fields, to the group memberships that the UserProxy has, are separate from the internal AD forest. &amp;nbsp;In essence, nothing is automatically the same and it&#39;s yet-another-directory-to-manage.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Wouldn&#39;t it be nice if there was a way to build a service or application in C# .NET so that a configurable subsection of your organization&#39;s internal AD user community could automatically be provisioned and deprovisioned, complete with metadata updates, and maybe even rudimentary AD-LDS group memberships based on your AD data? &amp;nbsp;Why yes, yes that would be very nice. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Wouldn&#39;t it be even nicer if the code was open source so we can take it, borrow it, and use it internally without a restrictive license? &amp;nbsp;Why yes, yes that would be very nice, too.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Wouldn&#39;t be even nicer still if this article linked straight to that source code?&lt;/div&gt;
&lt;div&gt;
Why yes, yes it sure would be nice.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Good thing we just did!&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/AdLdsSync&quot;&gt;Start synchronizing your Active Directory forest with your Lightweight Directory Services (AD-LDS) instance with this example solution in C#&lt;/a&gt;.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/7891665183234898029/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/7891665183234898029' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7891665183234898029'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7891665183234898029'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/06/coding-for-active-directory-proxying.html' title='Coding for Active Directory: Proxying Users into an AD-LDS Application Directory'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s72-c/AD.png" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-8649274560930332227</id><published>2013-06-03T00:00:00.000-05:00</published><updated>2013-06-03T15:59:40.382-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="active directory"/><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><title type='text'>Active Directory Tip: Hitting Snooze on the Password Expiration Policy</title><content type='html'>&lt;div&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;The Active Directory Password Expiration Snooze Button&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhskZedsZtakebYIGK_eyMhff3LE9r-y856WzJDEV-vuFK_QSvpSFeLuwyfWyxvAxrG_1DWZ67zgijG031Pf8kE8UB9y-CN0jQrkBbkSMxeeCqCS04S14rjMM2pe3SWZ3czEW49UP6XX9bh/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhskZedsZtakebYIGK_eyMhff3LE9r-y856WzJDEV-vuFK_QSvpSFeLuwyfWyxvAxrG_1DWZ67zgijG031Pf8kE8UB9y-CN0jQrkBbkSMxeeCqCS04S14rjMM2pe3SWZ3czEW49UP6XX9bh/s320/images.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
IT Administrators have certainly been in the tough scenario where a security policy mandates that passwords expire in X days, but there are constraints that make it really hard for the user account passwords to actually change. &amp;nbsp;For example:&lt;br /&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Dealing with service, application, or generic accounts and a strict constraint to not mark them as non-expiring (forever) passwords&lt;/li&gt;
&lt;li&gt;Dealing with rarely active human users who suddenly need to (on-demand) authenticate against an application, such as HR benefits open enrollment for employees who are not &quot;information workers&quot; (don&#39;t access computers).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
There are a couple tricks for dealing with this without causing interruption. &amp;nbsp;Take note that these &quot;tricks&quot; may completely circumvent the letter and perhaps even the intent of the &quot;policy&quot;. &amp;nbsp;But even with astute auditors, the intent of using these tricks will likely never get noticed.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Or perhaps you are an auditor, and reading the details of these tricks will open up your mind to look for new events that signify lack of compliance.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Administrative Password Resets&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqdtZjfr4EPMmrc_1ORCiYkI_vB4X-b3ATAvmZGNl7Hux7ednDOGEfbx4lRyLtyrGei1t_gezmfm9ktsEnXOHDNeVPyfBfgcayaEt3RrUC6zebx-3u3bK6hGOVpt-znO4P6wBTHTg1m8E/s1600/resetting_windows_password.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqdtZjfr4EPMmrc_1ORCiYkI_vB4X-b3ATAvmZGNl7Hux7ednDOGEfbx4lRyLtyrGei1t_gezmfm9ktsEnXOHDNeVPyfBfgcayaEt3RrUC6zebx-3u3bK6hGOVpt-znO4P6wBTHTg1m8E/s1600/resetting_windows_password.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
If you know the password for the account in question, then simply perform a password reset with that password. &amp;nbsp;If you have never thought to do this before, this may at first seem counter-intuitive: after all, resetting a password with a password history rule turned on by policy will cause the password to change, right?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Wrong. &amp;nbsp;There are two ways an Active Directory password can change:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;The user initiates a password &lt;i&gt;&lt;b&gt;change &lt;/b&gt;&lt;/i&gt;event, in which they are required to supply the current password in addition to a new password.&lt;/li&gt;
&lt;li&gt;The administrator with permissions on the UserAccountControl attribute of the AD user object can perform an administrative &lt;i&gt;&lt;b&gt;reset&lt;/b&gt;&lt;/i&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
A reset by an administrator must support changing the password when the user is locked out and does not know the password, therefore, the administrator is not required to know the current password.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Also, a reset by an administrator does not enforce password history. &amp;nbsp;If it did, a rogue administrator could inadvertently learn the current password if the new password supplied by the administrator failed to reset due to password history requirements. &amp;nbsp;Sure, they just reset the password and could impersonate the user anyway, but that may not be the point: that user&#39;s password might be the same on a different (non-Active Directory integrated) application.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
So, if you know the current password, perform a RESET and the password last set date attribute on the user account in the directory will update, effectively hitting the snooze button.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;A More Clever Trick&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
But what if you don&#39;t know the current password for the account? &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In the scenario of a mostly-inactive end user community that suddenly need to hit an application (e.g. your company&#39;s HR system for annual benefits enrollment):&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s1600/AD.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;143&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGYdM0u0OA7O1VHa-SEmrLi0iyBAcdwu8Oi4B9jBqeLmVjdQ6h1V0Na802e2C9G9hPYP-1-UbbxhsIofRp-HPQ-F2Rfr6wf6fJ0EyO0-tDUllyusqSNmaiLpngBddXjuUHnuKk4r4krA8l/s320/AD.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;
&lt;li&gt;there may be too many users to learn their passwords&lt;/li&gt;
&lt;li&gt;asking the user for their password is likely faux pas&lt;/li&gt;
&lt;li&gt;the user may not even know the password anyway (since it&#39;s been a year), and&amp;nbsp;&lt;/li&gt;
&lt;li&gt;resetting a large collection of users passwords to a standard/default that everyone shares is insecure&lt;/li&gt;
&lt;li&gt;and resetting individually unique passwords for an infrequent, on-demand access presents communication problems all of its own&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
So, what to do?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
You could disable or extend password expiration. &amp;nbsp;In Windows 2003 AD and earlier, this meant changing the policy for everybody, which may not be the intent at all. &amp;nbsp;This is especially true if there are both active and inactive users in the directory, since active users will not get the normal &quot;your password is about to expire&quot; warning X days before it&#39;s too late. &amp;nbsp;Reverting your password expiration policy setting back to the original value could result in a portion of your active users suddenly being locked out and calling for help. &amp;nbsp;In Windows 2008 and later, you can have multiple expiration policies within a domain, but your user objects may not be grouped to distinguish the inactive users of concern. &amp;nbsp;You could identify them and move them (and even script that step), but then you may have to move them back to many different OUs (Organizational Units) which could be just as much of a pain as the original problem.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Or you could follow this set of steps (which are scriptable!):&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;In Active Directory Users and Computers, locate the user with the expiring or expired password&lt;/li&gt;
&lt;li&gt;Check the &quot;force password change at next logon&quot; box.&lt;/li&gt;
&lt;li&gt;Click Apply.&lt;/li&gt;
&lt;li&gt;Uncheck the &quot;force password change at next logon&quot; box.&lt;/li&gt;
&lt;li&gt;Click Apply.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
And VOILA! &amp;nbsp;That user&#39;s password expiration has just been snoozed-- effectively reset for another iteration, and with zero knowledge of the current password. &amp;nbsp;The password last set date will appear to be the moment you hit step 5.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;How does this work?&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://imgs.xkcd.com/comics/identity.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;165&quot; src=&quot;http://imgs.xkcd.com/comics/identity.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Under the hood, the user attribute which stores the date/time when the password was last set is also dual purposed for the password must change flag. &amp;nbsp;The value is a really large integer which contains the number of ticks of seconds as a representation of time. &amp;nbsp;But when the force password change button is checked, the value of seconds of time is wiped out. &amp;nbsp;&quot;Empty&quot; is how the flag is stored. &amp;nbsp;The last date/time is wiped out. &amp;nbsp;So, when the administrator unchecks the force password change checkbox, AD Users &amp;amp; Computers has to put &lt;b&gt;&lt;i&gt;SOMETHING &lt;/i&gt;&lt;/b&gt;in that attribute, because &lt;b&gt;&lt;i&gt;NOTHING &lt;/i&gt;&lt;/b&gt;appears like it is flagged for change. &amp;nbsp;But the original value is gone forever! &amp;nbsp;So what does it store there? &amp;nbsp;The current date/time. &amp;nbsp;Hence, the user appears to have had its password reset without any actual (visible) changes to the user.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This can all be scripted out using the dsquery and dsmod commands the Microsoft ships with Active Directory. &amp;nbsp;PowerShell could also be used. &amp;nbsp;Or, an astute C# (or VB) .Net developer could simply take a look at the &lt;a href=&quot;http://securology.blogspot.com/2013/05/securologys-open-source-repository-on.html&quot;&gt;Securology GitHub repository&lt;/a&gt;, to see the example &lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/PasswordSnoozeButton&quot;&gt;Password Snooze Button&lt;/a&gt; console app, to incorporate it into your organization&#39;s existing user management applications and services.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;For the Auditor&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
To detect if an organization that you are auditing has been using the first option (administrative password resets to snooze the expiration), look for:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Event log data for password resets of multiple accounts at roughly the same time, since this would likely be done &quot;in mass&quot; by the IT administrator&lt;/li&gt;
&lt;li&gt;Service accounts that all have roughly the same password last set date and time. &amp;nbsp;Manually resetting multiple passwords would have a period of time between each reset event, but a script would cause them all to be within a few seconds of each other&lt;/li&gt;
&lt;li&gt;User accounts that have been in existence for longer than the password expiration policy&#39;s time out, but that have one or few historical passwords stored in the directory (requires a very low level AD editing tool to discover), while still being active (lots of log on events)&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
To detect if an organization has been using the second option (password must change flag), look for:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Lots of user accounts with nearly the same date/time value for the password last set attribute.&lt;/li&gt;
&lt;li&gt;Lots of user accounts that have not logged in since their password was last set.&lt;/li&gt;
&lt;li&gt;If event log data is available, look for lots events denoting the must change password flag was set or unset.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Even if long term historical event log data is available, the determined IT administrator could spread out these events to appear sporadic, random, or intentionally related to a user&#39;s call to a help desk. &amp;nbsp;A determined administrator could both keep the lights on and keep auditors at arms&#39; length without detection of a policy violation.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/8649274560930332227/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/8649274560930332227' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8649274560930332227'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8649274560930332227'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/06/active-directory-tip-hitting-snooze-on.html' title='Active Directory Tip: Hitting Snooze on the Password Expiration Policy'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhskZedsZtakebYIGK_eyMhff3LE9r-y856WzJDEV-vuFK_QSvpSFeLuwyfWyxvAxrG_1DWZ67zgijG031Pf8kE8UB9y-CN0jQrkBbkSMxeeCqCS04S14rjMM2pe3SWZ3czEW49UP6XX9bh/s72-c/images.jpg" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-9177987863965407460</id><published>2013-05-13T00:00:00.000-05:00</published><updated>2013-05-13T18:28:26.860-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><title type='text'>Securology&#39;s Open Source Repository on GitHub</title><content type='html'>Securology now has open source code on GitHub!&lt;br /&gt;
&lt;a href=&quot;https://github.com/Securology&quot;&gt;https://github.com/Securology&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
This is something we have wanted to do for some time and finally are now able! &amp;nbsp;As our contributors find the time and freedom to contribute some of our intellectual property back to the greater community at large, we will add more repositories and content there.&lt;br /&gt;
&lt;br /&gt;
Our first offering is a C# .NET wrapper that can do more to manage Microsoft Active Directory instances (including Active Directory Lightweight Directory Services, formerly known as ADAM, or Active Directory Application Mode) than any other open source project can do (which is why we wrote it in the first place). &amp;nbsp;Our open source Active Directory Services repo is available here:&lt;br /&gt;
&lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices&quot;&gt;https://github.com/Securology/ActiveDirectoryServices&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
In addition to &lt;a href=&quot;https://github.com/Securology/ActiveDirectoryServices/tree/master/AccountManagement&quot;&gt;shipping a core library that extends Microsoft&#39;s out-of-the-box functionality that ships with the .NET runtime (System.DirectoryServices.AccountManagement)&lt;/a&gt;, we also have fully working example applications that are consumers of the library, so you can see how to use all of the features we have built.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s a list of just some of the features our consumer applications can do:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Create, Edit, Update, and Delete Active Directory objects Users, Groups, Organizational Units (OUs), Contacts, etc.&lt;/li&gt;
&lt;li&gt;Create, Edit, Update, and Delete AD-LDS (ADAM) UserProxy and UserProxyFull objects.&lt;/li&gt;
&lt;li&gt;Sync AD Users into an AD-LDS (ADAM) instance as UserProxy or UserProxyFull objects.&lt;/li&gt;
&lt;li&gt;Create, Update, Delete, and generally manage/sync dynamic AD security/distribution groups based upon reporting relationships (if those are defined within Active Directory).&lt;/li&gt;
&lt;li&gt;Enable, set, and maintain Microsoft Exchange attributes to enable objects to become visible in the GAL (Global Address List), which also works for Microsoft&#39;s Exchange Online hosted service via DirSync.&lt;/li&gt;
&lt;li&gt;Import various rooms and resources from a .CSV file into Active Directory and enable their visibility in the Exchange GAL.&lt;/li&gt;
&lt;li&gt;Enable and Manage Office Communicator/Lync attributes to turn on/off access to your company&#39;s Lync/OCS server, setup default policies, including access to any internet-facing proxy servers as well as archive/logging per user.&lt;/li&gt;
&lt;li&gt;Generate random passwords for users.&lt;/li&gt;
&lt;li&gt;A nifty way of &quot;snoozing&quot; when a AD user&#39;s password expires while keeping the same password.&lt;/li&gt;
&lt;li&gt;And much more...&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Eventually, we will share a working Provisioning Web Service that will be a great solution for limited budget organizations that want some of the functionality Microsoft&#39;s Identity Lifecycle Manager (ILM) includes, without the heftier license cost and infrastructure requirements.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
More follow-up posts will follow.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/9177987863965407460/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/9177987863965407460' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/9177987863965407460'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/9177987863965407460'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/05/securologys-open-source-repository-on.html' title='Securology&#39;s Open Source Repository on GitHub'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-4782725610649111540</id><published>2013-02-12T00:00:00.000-06:00</published><updated>2013-02-12T00:00:11.397-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="complexity vs security"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Breaking into Kaba Door Locks</title><content type='html'>This is an older issue that was&lt;b&gt; resolved by an update from the manufacturer&lt;/b&gt;, but it&#39;s still an interesting story.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://securology.blogspot.com/2013/02/breaking-physical-locks.html&quot;&gt;Continuing from yesterday&lt;/a&gt;, Marc Weber Tobias also was instrumental in getting Kaba to update their Simplex push-button mechanical combination locks.&amp;nbsp; On those door locks, which have seen near ubiquitous deployment, a mechanical combination is entered into a push-button key pad, which unlocks the door.&amp;nbsp; Some models include other features, like &quot;bypass&quot; which allows a person inside to egress through the door without pushing the combination.&amp;nbsp; &lt;a href=&quot;http://www.forbes.com/sites/marcwebertobias/2011/02/09/opening-the-kaba-simplex-lock-just-how-easy-is-it/&quot;&gt;It&#39;s this feature on the Kaba lock that Tobias learned could be defeated with a rare earth magnet&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s a (slightly dry) walk through of how the lock is defeated using just a magnet, leaving no forensic evidence of unauthorized entry whatsoever:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube-nocookie.com/embed/5hHKVvUdPx4&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
One aspect of this story that will be interesting for computer security professionals is the element of &quot;responsible disclosure&quot; used by Tobias to attempt to force the hand of the manufacturer to fix the problem, followed by the manufacturer&#39;s all too familiar &quot;there is no such problem&quot; response (yet they did fix it).</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/4782725610649111540/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/4782725610649111540' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/4782725610649111540'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/4782725610649111540'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/02/breaking-into-kaba-door-locks.html' title='Breaking into Kaba Door Locks'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-8502906803833654766</id><published>2013-02-11T00:00:00.000-06:00</published><updated>2015-09-08T20:04:12.965-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Breaking Physical Locks</title><content type='html'>Recently, &lt;a href=&quot;http://www.wired.com/threatlevel/2012/07/gun-safes/&quot;&gt;Wired Magazine ran an article about just how easy it is for children to break into certain models of gun safes&lt;/a&gt;.&amp;nbsp; Their findings are interesting, but not totally surprising.&amp;nbsp; Watch for yourself if you haven&#39;t already seen it:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube-nocookie.com/embed/erGOJxQIf5c?list=UUh2mgLapvQ7psOWQKb2a8xQ&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;a href=&quot;http://securology.blogspot.com/2009/11/selecting-pistol-safe.html&quot;&gt;We did our own review of pistol safes here&lt;/a&gt;, but more or less comparing features of safes, not attempting to penetrate them as the article describes.&lt;br /&gt;
&lt;br /&gt;
One of the researchers, Marc Weber Tobias, has a variety of other very interesting (but dry) videos describing physical lock security and some of the particular products that are defeated.&amp;nbsp; His &lt;a href=&quot;https://www.youtube.com/user/mwtobias?feature=watch&quot;&gt;YouTube channel&lt;/a&gt; is worth a review.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/8502906803833654766/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/8502906803833654766' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8502906803833654766'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8502906803833654766'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2013/02/breaking-physical-locks.html' title='Breaking Physical Locks'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-7362217032102461996</id><published>2012-10-26T00:00:00.000-05:00</published><updated>2015-09-08T20:46:58.008-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="complexity vs security"/><category scheme="http://www.blogger.com/atom/ns#" term="content filtering"/><category scheme="http://www.blogger.com/atom/ns#" term="Digital Rights Management"/><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><category scheme="http://www.blogger.com/atom/ns#" term="Marketing FUD"/><category scheme="http://www.blogger.com/atom/ns#" term="software security"/><title type='text'>Sony&#39;s PS3 DRM Cracked</title><content type='html'>Anyone who pays any attention to DRM will extrapolate the general principle:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
You can never prevent an end-user who has physical control of a device from breaking any DRM scheme you can invent.&lt;/blockquote&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF8htf73bVwi5WksGPp1qPiGP5pPNZc7sEfv-jIDgPgQNImmi0ImXzGBqy56OwyGabdm5vANS20H40uZAKt4bpqju9VPnQJHuE6_tIDKtJf4QSHPXVJI7qYqkCYWIBEkVvlmjxfEXPA2tg/s1600/Super_Slim_PS3_35454664_35454666_35454667_35454668_18_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF8htf73bVwi5WksGPp1qPiGP5pPNZc7sEfv-jIDgPgQNImmi0ImXzGBqy56OwyGabdm5vANS20H40uZAKt4bpqju9VPnQJHuE6_tIDKtJf4QSHPXVJI7qYqkCYWIBEkVvlmjxfEXPA2tg/s1600/Super_Slim_PS3_35454664_35454666_35454667_35454668_18_1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://news.cnet.com/8301-17938_105-57539756-1/sonys-playstation-3-experiences-its-biggest-hack-yet/&quot;&gt;Sony just learned their DRM lesson (again)&lt;/a&gt;.&amp;nbsp; I&#39;m sure that people at Sony already know this principle, but some &quot;suit&quot; tells the engineers to &quot;do something about the problem&quot; so they implement a technical speed bump. That&#39;s all it is and will ever be.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/7362217032102461996/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/7362217032102461996' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7362217032102461996'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7362217032102461996'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/10/sonys-ps3-drm-cracked.html' title='Sony&#39;s PS3 DRM Cracked'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF8htf73bVwi5WksGPp1qPiGP5pPNZc7sEfv-jIDgPgQNImmi0ImXzGBqy56OwyGabdm5vANS20H40uZAKt4bpqju9VPnQJHuE6_tIDKtJf4QSHPXVJI7qYqkCYWIBEkVvlmjxfEXPA2tg/s72-c/Super_Slim_PS3_35454664_35454666_35454667_35454668_18_1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-2922134650581548076</id><published>2012-10-18T00:00:00.000-05:00</published><updated>2015-09-08T20:10:27.008-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><category scheme="http://www.blogger.com/atom/ns#" term="Marketing FUD"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Skeleton Keys</title><content type='html'>Wouldn&#39;t it be really scary if physical locks in large planned cities like NYC were designed to use skeleton keys-- master keys that are shared with do-gooder firefighters and locksmiths alike-- without ever thinking what could happen if such keys got into realm of the average Joe, whose do-gooder status was unknown?&amp;nbsp; &lt;a href=&quot;http://m.nypost.com/p/news/local/open_door_to_terrorism_skC6uYlsymrLMKsXh4s2GM&quot;&gt;Yep it would&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://i.huffpost.com/gen/796063/thumbs/r-CITY-KEYS-NEW-YORK-large570.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://i.huffpost.com/gen/796063/thumbs/r-CITY-KEYS-NEW-YORK-large570.jpg&quot; height=&quot;133&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Look but don&#39;t pay attention to key teeth details!&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Wouldn&#39;t it be even scarier if those who cried &quot;the sky is falling, the sky is falling&quot; also were dumb enough to post high res photos of the skeleton keys on their websites (pictured left) so that anyone with access to key blanks and tools could easily measure and create their own skeleton key copies?&amp;nbsp; &lt;a href=&quot;http://www.huffingtonpost.com/2012/10/01/daniel-ferraris-new-york-master-keys_n_1928826.html&quot;&gt;Again, yes&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/2922134650581548076/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/2922134650581548076' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/2922134650581548076'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/2922134650581548076'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/10/skeleton-keys.html' title='Skeleton Keys'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-3407397014915065807</id><published>2012-10-13T00:00:00.000-05:00</published><updated>2015-09-08T19:56:59.583-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DIY"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Picking Handcuffs</title><content type='html'>Because you never know when you just might need to have this skill:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube-nocookie.com/embed/yvb4XLQS0Zo&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/3407397014915065807/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/3407397014915065807' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/3407397014915065807'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/3407397014915065807'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/10/picking-handcuffs.html' title='Picking Handcuffs'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-1319177476252353678</id><published>2012-10-06T00:00:00.000-05:00</published><updated>2015-09-08T20:28:28.453-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="education"/><category scheme="http://www.blogger.com/atom/ns#" term="software security"/><title type='text'>Finally a Safe Hello World</title><content type='html'>It&#39;s very common for &lt;a href=&quot;http://en.wikipedia.org/wiki/Hello_world_program&quot;&gt;Hello World&lt;/a&gt; example apps in textbooks or other educational literature to promote insecure software building practices right out of the gate.&amp;nbsp; What a breath of fresh air to see the Microsoft MVC folks safely HTML encoding (to avoid &lt;a href=&quot;http://en.wikipedia.org/wiki/Cross-site_scripting&quot;&gt;XSS&lt;/a&gt;) in their &lt;a href=&quot;http://www.asp.net/mvc/tutorials/mvc-4/getting-started-with-aspnet-mvc4/intro-to-aspnet-mvc-4&quot;&gt;MVC4 Hello World application&lt;/a&gt;!&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG9menwn-AobOIpogeuNIf2iNRdK3odQ5vQYkyjqfwyWtOpmTO1_ESTtTV0PfyVllmG9tY4G7jTT2K2t63rYgDPDp5btB1zbe5-9cj5AM4Uvse7m5XW_SwsCA5vQbr4ZMJOWbu0BOnOcVr/s1600/htmlencode.JPG&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG9menwn-AobOIpogeuNIf2iNRdK3odQ5vQYkyjqfwyWtOpmTO1_ESTtTV0PfyVllmG9tY4G7jTT2K2t63rYgDPDp5btB1zbe5-9cj5AM4Uvse7m5XW_SwsCA5vQbr4ZMJOWbu0BOnOcVr/s1600/htmlencode.JPG&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/1319177476252353678/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/1319177476252353678' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/1319177476252353678'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/1319177476252353678'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/10/finally-safe-hello-world.html' title='Finally a Safe Hello World'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG9menwn-AobOIpogeuNIf2iNRdK3odQ5vQYkyjqfwyWtOpmTO1_ESTtTV0PfyVllmG9tY4G7jTT2K2t63rYgDPDp5btB1zbe5-9cj5AM4Uvse7m5XW_SwsCA5vQbr4ZMJOWbu0BOnOcVr/s72-c/htmlencode.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-4314459691516540727</id><published>2012-10-05T00:00:00.000-05:00</published><updated>2015-09-08T20:47:58.099-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><category scheme="http://www.blogger.com/atom/ns#" term="Marketing FUD"/><title type='text'>Coping with Compromised Certificate Authorities</title><content type='html'>With the &lt;a href=&quot;http://securitywatch.pcmag.com/none/303363-adobe-revokes-certificates-following-server-compromise&quot;&gt;news&lt;/a&gt; containing stories of malware distributing via compromised &lt;a href=&quot;http://securology.blogspot.com/2012/10/who-are-you.html&quot;&gt;Certificate Authorities&lt;/a&gt;, it makes sense that some IT Security blogs would address &quot;what to do&quot; if this happens to your CA.&amp;nbsp; This &lt;a href=&quot;http://blog.isc2.org/isc2_blog/2012/10/mitigating-against-a-certificate-authority-breach.html&quot;&gt;blog post&lt;/a&gt; gets it wrong, though:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
What would you do if you found out that the Certificate Authority 
that provides Digital Certificates to your company was compromised, and 
Microsoft was adding the Certificate Authority’s public key to Windows 
un-trusted Root Store? Well if you have not got a contingency plan to 
implement then I can presume you will be in a panic to purchase new 
certificates from another Certificate Authority... It can take Certificate 
Authority’s (CA’s) a few days to validate domain ownership and company 
registration details... While all this is 
happening your customers are getting a message from Internet Explorer 
that your SSL certificate is not to be trusted. &lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
What can you do?&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Do not rely on one Certificate Authority for all of your certificates. You should have a relationship with at least two well known Certificate Authority’s and the CA’s should have validated all of your domains. This will let you quickly order Digital Certificates from the second CA without having to go through the company validation process...&lt;/li&gt;
&lt;li&gt;If you cannot tolerate any downtime for a service you can take the extra step in which you create backup certificates for each service using your backup Certificate Authority. This will enable you to implement the backup certificates without having to contact the second CA and joining the queue of company’s looking for new certificates. &lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
Keep in mind that the worst-case scenario described above would require the Root CA Certificate to be compromised.&amp;nbsp; Most Root CAs are offline certs, meaning the computers that house them are not powered on except during special circumstances when new intermediate CA certificates are generated, OR, they are online in an &lt;a href=&quot;https://en.wikipedia.org/wiki/Air_gap_%28networking%29&quot;&gt;&quot;air gap&quot;&lt;/a&gt; (disconnected from the internet) network accessible only via &lt;a href=&quot;https://en.wikipedia.org/wiki/Sneakernet&quot;&gt;sneakernet&lt;/a&gt;.&amp;nbsp; Exploiting an offline CA is a big deal, and if it occurs it won&#39;t be just your organization that is affected, but likely a large part of the entire internet.&lt;br /&gt;
&lt;br /&gt;
So a much more plausible option:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;The CA will just create a new intermediate CA cert 
and re-issue client certs to all of its paying customers. &lt;/li&gt;
&lt;/ul&gt;
In other words: nothing to see here, please move along.
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/4314459691516540727/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/4314459691516540727' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/4314459691516540727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/4314459691516540727'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/10/coping-with-compromised-certificate.html' title='Coping with Compromised Certificate Authorities'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-973174083153049009</id><published>2012-09-27T00:00:00.001-05:00</published><updated>2015-09-08T20:30:17.882-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="design"/><category scheme="http://www.blogger.com/atom/ns#" term="history"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Vauban Star Fortifications</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://upload.wikimedia.org/wikipedia/commons/6/6c/Fortbourtange.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;https://upload.wikimedia.org/wikipedia/commons/6/6c/Fortbourtange.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Bourtange Star Shaped Fort&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Taking a blast from the past that still has some application in today&#39;s physical security landscape ...&amp;nbsp; &lt;a href=&quot;https://en.wikipedia.org/wiki/Star_fort&quot;&gt;Star Shaped Forts&lt;/a&gt; using the &lt;a href=&quot;https://en.wikipedia.org/wiki/Vauban&quot;&gt;Vauban (military engineering) Principle&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Acute angles on the corners of a building are added to the architectural design to eliminate &quot;dead zones&quot; in which an adversary could hide or take refuge.&amp;nbsp; At the time of star shaped fortifications, all of the competing designs employed rounded towers or turrets at each corner, typically to house archers.&amp;nbsp; As a breaching force approached the rounded corner, they were able to hide from the archers using the fortifications intended to be an asset in favor of the defenders.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
Acute angles, however, prevented the breaching force from seeking shelter along the very walls intended to shelter the defenders.&amp;nbsp; [See the illustration, below right.]&lt;br /&gt;
&lt;br /&gt;
Modern applications against a well equipped modern adversary are very limited, since &quot;air support&quot; ruined traditional fort designs (adversaries can simply rain fire from above).&amp;nbsp; However, against a low tech insurgency, the classic star design still prevails.&lt;br /&gt;
&lt;br /&gt;
There are also applications for the acute corners in modern civil architecture.&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgknEW29Yu_pO0FGUVvJ0pOr35xfFMUbustyjzR5ru7hAHWzP90ekANqgf1JAs1eFQS1k9mhl-zpq9A4gMVptsSfjld_BmdSF70Nt9U91nZVVNYTd-DLF2lNONeCPuj6di2qshyU_9_c4BP/s1600/star.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgknEW29Yu_pO0FGUVvJ0pOr35xfFMUbustyjzR5ru7hAHWzP90ekANqgf1JAs1eFQS1k9mhl-zpq9A4gMVptsSfjld_BmdSF70Nt9U91nZVVNYTd-DLF2lNONeCPuj6di2qshyU_9_c4BP/s320/star.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
For example, an HVT (High Value Target) person, such as a celebrity, bank CEO, or anyone else that might typically employ a Private Security Detail, these corners help to deter snatch-and-grab and similar attacks by simply limiting the avenues of approach.&amp;nbsp; &lt;a href=&quot;https://en.wikipedia.org/wiki/Cooper,_Jeff&quot;&gt;Col Jeff Cooper&lt;/a&gt;, famous for dealing with small arms fire, had a fascination with these acute angles to the extent that the term &quot;Cooper Corners&quot; was coined referring to this much older design.&lt;br /&gt;
&lt;br /&gt;
In public civil architecture, there are obvious applications in places such as bank vaults, manufacturing facilities where the likelihood of espionage is high, and even public restrooms in semi-remote and semi-private, yet public places like city parks, where the likelihood of an after dark robbery or rape assault is high.&amp;nbsp; In the case of the park (along with a well designed layout of lighting, landscaping, and shrubbery) the acute angles may be just the trick to eliminate lie-in-wait hiding places.&lt;br /&gt;
&lt;br /&gt;
The next time you are tasked with securing a high value asset at a physical location, being familiar with the acute angles of the Medieval star fort might be the exact tool you need to pull out of your security toolbox. </content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/973174083153049009/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/973174083153049009' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/973174083153049009'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/973174083153049009'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/09/vauban-star-fortifications.html' title='Vauban Star Fortifications'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgknEW29Yu_pO0FGUVvJ0pOr35xfFMUbustyjzR5ru7hAHWzP90ekANqgf1JAs1eFQS1k9mhl-zpq9A4gMVptsSfjld_BmdSF70Nt9U91nZVVNYTd-DLF2lNONeCPuj6di2qshyU_9_c4BP/s72-c/star.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-6960737985279073774</id><published>2012-09-26T00:00:00.000-05:00</published><updated>2015-09-08T19:57:24.628-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DIY"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Avoiding Protests with a DIY Press Pass</title><content type='html'>Do you live in an area that is likely to have civil unrest and protests?&amp;nbsp; Perhaps having a Press Pass may get you out of trouble.&amp;nbsp; &lt;a href=&quot;http://www.itstactical.com/intellicom/physical-security/prevailing-in-the-face-of-protest-and-why-you-should-have-a-press-pass/&quot;&gt;ITS Tactical ran an article&lt;/a&gt; on just how to do this.&lt;br /&gt;
&lt;br /&gt;
An excerpt: &lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;b&gt;Protesting is About Attention!&lt;/b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJLkbdMKobT5A7yI-MdyaKVFiDaE00H6owIhDm6q7g-TUXZdWXhv6dz84w-dYwfAXp__XmqIOewWcTpYqne38NyRtrYfYubeBK9d94_prwzZPi-R4LptwKAzk7cjogXVPRz3RzAJSwJoWb/s1600/presspass.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJLkbdMKobT5A7yI-MdyaKVFiDaE00H6owIhDm6q7g-TUXZdWXhv6dz84w-dYwfAXp__XmqIOewWcTpYqne38NyRtrYfYubeBK9d94_prwzZPi-R4LptwKAzk7cjogXVPRz3RzAJSwJoWb/s1600/presspass.jpg&quot; /&gt;&lt;/a&gt;Use that to your advantage. 
Protesters love the press. It can be a relatively simple proposition to 
get a press pass that will get you through/past protests that completely
 block traffic. Afterwards, ask them for a letter stating you have 
written for them, etc.&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;&lt;blockquote&gt;
&lt;a href=&quot;http://www.itstactical.com/wp-content/uploads/2012/01/53523109_e35e3ba5d8_m.jpg&quot;&gt;&lt;noscript&gt;&lt;/noscript&gt;&lt;/a&gt;Set up a blog using a free service like Blogger or WordPress.&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;blockquote&gt;
Write an “About” page or article telling people that this blog is for covering local protests or demonstrations&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;blockquote&gt;
Design your own press ID using a template (&lt;a href=&quot;http://binghamtonpmc.org/bhuston/presspass/&quot; target=&quot;_blank&quot;&gt;Here’s an example template&lt;/a&gt;). Don’t lie on the pass. It’s not necessary.&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;blockquote&gt;
Print it on a solid plastic card. There are tons of companies that will do this for a few bucks. (&lt;a href=&quot;http://lmgtfy.com/?q=custom+printed+pvc+cards&quot; target=&quot;_blank&quot;&gt;Here are a few&lt;/a&gt;) I had mine printed locally for &amp;nbsp;about $.80 each.&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;blockquote&gt;
Throw the ID on a lanyard or in an &lt;a href=&quot;http://www.amazon.com/Chums-Arm-Band-Pass-Holder/dp/B000FH5S6Y&quot; target=&quot;_blank&quot;&gt;ID armband&lt;/a&gt;&amp;nbsp;and stash it in the glove compartment for whenever you may need it.&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;blockquote&gt;
If
 you have to use it, present it with authority! &amp;nbsp;It has never failed me,
 even under the scrutiny of armed soldiers at roadblocks.&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/6960737985279073774/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/6960737985279073774' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/6960737985279073774'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/6960737985279073774'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/09/avoiding-protests-with-diy-press-pass.html' title='Avoiding Protests with a DIY Press Pass'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJLkbdMKobT5A7yI-MdyaKVFiDaE00H6owIhDm6q7g-TUXZdWXhv6dz84w-dYwfAXp__XmqIOewWcTpYqne38NyRtrYfYubeBK9d94_prwzZPi-R4LptwKAzk7cjogXVPRz3RzAJSwJoWb/s72-c/presspass.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-8288935257561702354</id><published>2012-09-21T00:00:00.000-05:00</published><updated>2012-09-21T09:10:00.137-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><title type='text'>Destroying Paper Documents</title><content type='html'>The folks over at ITS Tactical have an interesting article on &lt;a href=&quot;http://www.itstactical.com/intellicom/physical-security/how-to-securely-dispose-of-sensitive-documents/&quot;&gt;securely disposing paper documents&lt;/a&gt;. &lt;br /&gt;
&lt;br /&gt;
Here is an excerpt: &lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;h3&gt;
Reconstruction&lt;/h3&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOieMUGK37VWVqTBg2wD4QyMTfwqZqMaFXPj0yCULNLnhfe38HZDIPbC7kkpjHhNcynFgyLBZmAiCjRUDNDbltINz4iCDJTCkJAZbYcrHDdmu9nySNRhLBQJWmnESWqoZT188vqRQMAHGw/s1600/irdoc1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOieMUGK37VWVqTBg2wD4QyMTfwqZqMaFXPj0yCULNLnhfe38HZDIPbC7kkpjHhNcynFgyLBZmAiCjRUDNDbltINz4iCDJTCkJAZbYcrHDdmu9nySNRhLBQJWmnESWqoZT188vqRQMAHGw/s320/irdoc1.jpg&quot; width=&quot;228&quot; /&gt;&lt;/a&gt;The reconstruction of sensitive documentation has been around as long as shredders have. According to a fantastic &lt;a href=&quot;http://www.nytimes.com/2003/07/17/technology/back-together-again.html&quot; target=&quot;_blank&quot;&gt;NY Time article&lt;/a&gt;
 that everyone should read, reconstruction was first brought to light 
during the 1979 US Embassy takeover in Tehran. The Iranians elicited the
 help of local carpet weavers to reconstruct sensitive documents, which 
were sold on the streets of Tehran as a testament to US imperialism.&lt;br /&gt;
&lt;br /&gt;
Just know that with some time and even the help of computer programs like &lt;a href=&quot;http://www.unshredder.com/&quot; target=&quot;_blank&quot;&gt;Unshredder&lt;/a&gt;, there isn’t much reassurance that your documents will stay shredded.&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoEX4TrujXEENFgMN4SpTcel6dt_biDf0KDqWIMgJtt1OoJfDP07KNe6oyPOris1USdy8WQ4pm0NdnY_xH2uH1D740oj85NcoXvfenyU5jt0th9zG4C-_Fm6gyms2-MEiVbU95RRazIDpZ/s1600/BurnBagMain.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoEX4TrujXEENFgMN4SpTcel6dt_biDf0KDqWIMgJtt1OoJfDP07KNe6oyPOris1USdy8WQ4pm0NdnY_xH2uH1D740oj85NcoXvfenyU5jt0th9zG4C-_Fm6gyms2-MEiVbU95RRazIDpZ/s1600/BurnBagMain.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Document Burn Bag&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;a href=&quot;http://www.itstactical.com/store/burn-bag/&quot;&gt;ITS Tactical also sells &quot;Burn Bags&quot;&lt;/a&gt; for important documents (or shreddings from documents) at a reasonable price, just like the kind you&#39;d find at government agencies or in the movies.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/8288935257561702354/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/8288935257561702354' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8288935257561702354'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/8288935257561702354'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/09/destroying-paper-documents.html' title='Destroying Paper Documents'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOieMUGK37VWVqTBg2wD4QyMTfwqZqMaFXPj0yCULNLnhfe38HZDIPbC7kkpjHhNcynFgyLBZmAiCjRUDNDbltINz4iCDJTCkJAZbYcrHDdmu9nySNRhLBQJWmnESWqoZT188vqRQMAHGw/s72-c/irdoc1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-6025506908526561954</id><published>2012-09-20T00:00:00.000-05:00</published><updated>2012-09-20T00:00:09.320-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="humor"/><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><title type='text'>XKCD Password Strength</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://xkcd.com/936/&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;516&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx9-6tFG4EX1UsXMbHYbO-WQpmkcH8KWd5IxknDdLVtnGtUOd252eG3GI5m0dhROCFR_UI5dN-fl2b1TK22dVIdgUvJGh9rpvkisgj4nRqgoZCSp7U9pZIUJAScg0W-DuByUUPb8qoFaNa/s640/password_strength.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/6025506908526561954/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/6025506908526561954' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/6025506908526561954'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/6025506908526561954'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/09/xkcd-password-strength.html' title='XKCD Password Strength'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx9-6tFG4EX1UsXMbHYbO-WQpmkcH8KWd5IxknDdLVtnGtUOd252eG3GI5m0dhROCFR_UI5dN-fl2b1TK22dVIdgUvJGh9rpvkisgj4nRqgoZCSp7U9pZIUJAScg0W-DuByUUPb8qoFaNa/s72-c/password_strength.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-9119233016269000882</id><published>2012-09-11T00:00:00.000-05:00</published><updated>2012-09-11T15:05:54.628-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Lock Kill</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsXDrbvLK9Zi8wUO0NQoP4_kgbO6hCKdlW3oaMEW7iYfxOE29LY1ohOyYsIAlQSs6aiYk9-AWQdPE2EYVxwW6EFbDL8Q8lnfrrrKGbOcrmJF7vX-cSPYCu6BcsxoNDuKewIqTGgSxOdslE/s1600/stacks_image_2_1.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsXDrbvLK9Zi8wUO0NQoP4_kgbO6hCKdlW3oaMEW7iYfxOE29LY1ohOyYsIAlQSs6aiYk9-AWQdPE2EYVxwW6EFbDL8Q8lnfrrrKGbOcrmJF7vX-cSPYCu6BcsxoNDuKewIqTGgSxOdslE/s320/stacks_image_2_1.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Do you have a house/door key lock that you no longer want somebody to have the ability to unlock, but you don&#39;t have time to change the locks?&amp;nbsp; Maybe you&#39;re a landlord?&amp;nbsp; Or maybe you have some hidden purpose, such as forcing door traffic to a different entry to the building?&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.lockkill.com/&quot;&gt;LockKill&lt;/a&gt; has a solution: a specialty key designed to slip in, bypass tumblers long enough to get all the way set, and then sheer off in place, destroying the lock.&amp;nbsp; It only takes a few seconds.&lt;br /&gt;
&lt;br /&gt;
Warning: the only real way of bringing that lock back from the dead is to replace it.&lt;br /&gt;
&lt;br /&gt;
Watch the review by &lt;a href=&quot;http://www.itstactical.com/skillcom/lock-picking/permanently-disable-a-household-lock-with-lock-kill/&quot;&gt;ITS Tactical&lt;/a&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube-nocookie.com/embed/pKIwfJt78Eo&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/9119233016269000882/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/9119233016269000882' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/9119233016269000882'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/9119233016269000882'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/09/lock-kill.html' title='Lock Kill'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsXDrbvLK9Zi8wUO0NQoP4_kgbO6hCKdlW3oaMEW7iYfxOE29LY1ohOyYsIAlQSs6aiYk9-AWQdPE2EYVxwW6EFbDL8Q8lnfrrrKGbOcrmJF7vX-cSPYCu6BcsxoNDuKewIqTGgSxOdslE/s72-c/stacks_image_2_1.png" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-1272565073922552170</id><published>2012-09-08T00:00:00.000-05:00</published><updated>2015-09-08T20:26:09.582-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="humor"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><title type='text'>Cognitive Side Channels</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL2br1PDO4hTYilA4NG9npZdwlA5b0MFF8vjuNHMxM2XrT7fQF8g8lWFqSuId4dIEpiA1zAeKrLoemzQlaYDmiUnzczzc48AfngN8jgxx6FOwewdKiUm1qMgIycKe1vlg0f3jE8eKvhEwi/s1600/Screen-Shot-2012-08-15-at-1.30.11-PM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;317&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL2br1PDO4hTYilA4NG9npZdwlA5b0MFF8vjuNHMxM2XrT7fQF8g8lWFqSuId4dIEpiA1zAeKrLoemzQlaYDmiUnzczzc48AfngN8jgxx6FOwewdKiUm1qMgIycKe1vlg0f3jE8eKvhEwi/s320/Screen-Shot-2012-08-15-at-1.30.11-PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
A &lt;a href=&quot;http://www.forbes.com/sites/andygreenberg/2012/08/16/mind-control-gaming-devices-leak-brain-data-that-help-researchers-guess-users-secrets/&quot;&gt;recent media buzz&lt;/a&gt; &lt;a href=&quot;https://www.schneier.com/blog/archives/2012/09/hacking_brain-c.html&quot;&gt;this week&lt;/a&gt; involves so-called &lt;a href=&quot;https://www.usenix.org/conference/usenixsecurity12/feasibility-side-channel-attacks-brain-computer-interfaces&quot;&gt;&quot;side channel&quot; attacks or leakages of information from human brain to computer interfaces&lt;/a&gt;.&amp;nbsp; Not a ubiquitous technology today, but quite possibly down the road.&lt;br /&gt;
&lt;br /&gt;
Essentially the attacks follow the lines of showing a plugged-in subject a bank, in which case the subject&#39;s mind races down the neural paths for things like account numbers, PINs, maybe balances or recent expenditures, etc.&amp;nbsp; And the mere thoughts picked up by the device can capture these otherwise private thoughts inside the subject&#39;s brain.&lt;br /&gt;
&lt;br /&gt;
Sound scary?&amp;nbsp; It is.&amp;nbsp; The brain wasn&#39;t designed to keep information from itself.&amp;nbsp; Count us out of the &quot;early adopter program&quot;.&lt;br /&gt;
&lt;br /&gt;
Reminds us of the time the Ghostbusters were told the worst thing they could think of would be their next enemy:&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;https://www.youtube-nocookie.com/embed/d-sALU_hveA&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/1272565073922552170/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/1272565073922552170' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/1272565073922552170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/1272565073922552170'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/09/cognitive-liberty.html' title='Cognitive Side Channels'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL2br1PDO4hTYilA4NG9npZdwlA5b0MFF8vjuNHMxM2XrT7fQF8g8lWFqSuId4dIEpiA1zAeKrLoemzQlaYDmiUnzczzc48AfngN8jgxx6FOwewdKiUm1qMgIycKe1vlg0f3jE8eKvhEwi/s72-c/Screen-Shot-2012-08-15-at-1.30.11-PM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-3669712198355332909</id><published>2012-08-24T00:00:00.000-05:00</published><updated>2015-09-08T19:58:37.019-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="complexity vs security"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Marketing FUD"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><category scheme="http://www.blogger.com/atom/ns#" term="software security"/><title type='text'>Protecting Cars from Viruses</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb7cjKHXmPrVqIlVHaCB1LGuKpCTlJ0b7icenStrU4Za8w_hC_4KGbLq3nGPv910PO2i0m_lX11fZhDNjzWhHlLXSW3xpyz8taBrfAPCoTNjSHI-Wyex96kBDmlb3udZil0WAmqF2h_zql/s1600/s1.reutersmedia.net.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb7cjKHXmPrVqIlVHaCB1LGuKpCTlJ0b7icenStrU4Za8w_hC_4KGbLq3nGPv910PO2i0m_lX11fZhDNjzWhHlLXSW3xpyz8taBrfAPCoTNjSHI-Wyex96kBDmlb3udZil0WAmqF2h_zql/s320/s1.reutersmedia.net.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Reuters is running a story that should amuse any computer security professional: &lt;a href=&quot;http://www.reuters.com/article/2012/08/20/us-autos-hackers-idUSBRE87J03X20120820&quot;&gt;Experts hope to shield cars from computer viruses&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
An excerpt:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Intel&#39;s McAfee unit, which is best known for 
software that fights PC viruses, is one of a handful of firms that are 
looking to protect the dozens of tiny computers and electronic 
communications systems that are built into every modern car.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;/span&gt;&lt;br /&gt;
It&#39;s
 scary business. Security experts say that automakers have so far failed
 to adequately protect these systems, leaving them vulnerable to hacks 
by attackers looking to steal cars, eavesdrop on conversations, or even 
harm passengers by causing vehicles to crash.&lt;/blockquote&gt;
Our guess is that when cars get to the point that they drive themselves, those who understand how malware works-- and more important: how undeniably complicated modern software and its hardware architecture can be-- will start donning a pair of &lt;a href=&quot;https://en.wikipedia.org/wiki/Chuck_Taylor_All-Stars&quot;&gt;Converse Chuck Taylors&lt;/a&gt; and resemble a modern &lt;a href=&quot;https://en.wikipedia.org/wiki/Luddite&quot;&gt;Luddite&lt;/a&gt; by driving themselves, a la &lt;a href=&quot;http://www.imdb.com/title/tt0343818/&quot;&gt;Will Smith in I, Robot&lt;/a&gt;. &lt;br /&gt;
&lt;br /&gt;
When you look at the statistics, &lt;a href=&quot;http://securology.blogspot.com/2012/04/chances-of-dying-infographic.html&quot;&gt;you are far more likely to get injured or die in a car accident than you are in nearly any other security risk you face in your daily life&lt;/a&gt;.&amp;nbsp; Even with the vast skies being what they are, and the regulations on the airlines industry and their pilots, it&#39;s not possible to keep air travel 100% safe, though it&#39;s safer than driving (once you get past the &lt;a href=&quot;http://securology.blogspot.com/search?q=TSA&quot;&gt;TSA checkpoint&lt;/a&gt;).&lt;br /&gt;
&lt;br /&gt;
Computerized, self-driving cars &lt;i&gt;may &lt;/i&gt;improve (emphasis on &quot;may&quot;) safety stats; however, not if their software landscape looks like anything else we operate with a CPU in it these days.&amp;nbsp; There are agencies with an operating budget larger than the GDP of several nations that are terrified about the possibility of malware injected into things like military aircraft or missile guidance systems.&amp;nbsp; Given that, how in the world is an automobile for ~$20K (which is at most 1% of the price tag of the military&#39;s concerns) ever going to be 100% free of malware?&amp;nbsp; &lt;b&gt;Simple: it won&#39;t be.&lt;/b&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;Toyota Motor Corp, the world&#39;s biggest automaker, said it was not aware of any hacking incidents on its cars. &lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&quot;They&#39;re
 basically designed to change coding constantly. &lt;b&gt;I won&#39;t say it&#39;s 
impossible to hack, but it&#39;s pretty close&lt;/b&gt;,&quot; said Toyota spokesman John 
Hanson. [emphasis ours]&lt;/span&gt;&lt;/blockquote&gt;
Oh, we&#39;ve never heard that before...&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Officials with Hyundai Motor Co, Nissan Motor Co and Volkswagen AG said they could not immediately comment on the issue.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;span id=&quot;midArticle_0&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
A
 spokesman for Honda Motor Co said that the Japanese automaker was 
studying the security of on-vehicle computer systems, but declined to 
discuss those efforts.&lt;/blockquote&gt;
Mums the word is a much smarter response to the press.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;A spokesman for the U.S. Department of Homeland 
Security declined to comment when asked how seriously the agency 
considers the risk that hackers could launch attacks on vehicles or say 
whether DHS had learned of any such incidents.&lt;/span&gt;&lt;/blockquote&gt;
They probably declined to comment because they are working on exploits for these as well.&amp;nbsp; Say it ain&#39;t so?&amp;nbsp; Look no further than &lt;a href=&quot;http://securology.blogspot.com/search?q=flame&quot;&gt;Stuxnet and Flame&lt;/a&gt;, of which the US Gov takes full authorship credits.&amp;nbsp; It&#39;s the future of the &quot;cyberwarfarestate&quot;.&lt;br /&gt;
&lt;br /&gt;
We can&#39;t keep malware out of critical infrastructure SCADA systems.&amp;nbsp; There&#39;s no way we can keep it out of your mom&#39;s minivan.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/3669712198355332909/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/3669712198355332909' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/3669712198355332909'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/3669712198355332909'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/08/protecting-cars-from-viruses.html' title='Protecting Cars from Viruses'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb7cjKHXmPrVqIlVHaCB1LGuKpCTlJ0b7icenStrU4Za8w_hC_4KGbLq3nGPv910PO2i0m_lX11fZhDNjzWhHlLXSW3xpyz8taBrfAPCoTNjSHI-Wyex96kBDmlb3udZil0WAmqF2h_zql/s72-c/s1.reutersmedia.net.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-5807862430298402825</id><published>2012-08-16T00:00:00.000-05:00</published><updated>2015-09-08T20:30:26.383-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="complexity vs security"/><category scheme="http://www.blogger.com/atom/ns#" term="history"/><category scheme="http://www.blogger.com/atom/ns#" term="software security"/><category scheme="http://www.blogger.com/atom/ns#" term="Trust"/><title type='text'>Classic Trust</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyC28PQynaRmT54sOBAXjkq1OyhCctGd5RCsWWzVNDKfJxjn6kcSYtEXSVOAjY2YXj0_ZZDIX4hpfhkcDrh3ZHZhqo5VNcb3fHzaACPTA4ViMIvwIX-FCWA3jQBjKCPACMEThHlw2JJWEv/s1600/th.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyC28PQynaRmT54sOBAXjkq1OyhCctGd5RCsWWzVNDKfJxjn6kcSYtEXSVOAjY2YXj0_ZZDIX4hpfhkcDrh3ZHZhqo5VNcb3fHzaACPTA4ViMIvwIX-FCWA3jQBjKCPACMEThHlw2JJWEv/s1600/th.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Ken_Thompson&quot;&gt;Ken Thompson&lt;/a&gt; is on the left. That&#39;s not &lt;a href=&quot;https://en.wikipedia.org/wiki/Adam_Savage&quot;&gt;Adam Savage&lt;/a&gt; on the right.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
If you work in computer security or software development, and you have never read Unix co-creator &lt;a href=&quot;http://cm.bell-labs.com/who/ken/trust.html&quot;&gt;Ken Thompson&#39;s original 1984 speech &quot;Reflections on Trusting Trust&quot;&lt;/a&gt; then you are hereby obliged to at least read the following snippet for today&#39;s history lesson, which is just as relevant-- actually more so-- today:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
The moral is obvious. You can&#39;t trust code that you did not totally
create yourself. (Especially code from companies that employ people
like me.) No amount of source-level verification or scrutiny will protect
you from using untrusted code. In demonstrating the possibility of this
kind of attack, I picked on the C compiler. I could have picked on any
program-handling program such as an assembler, a loader, or even
hardware microcode. As the level of program gets lower, these bugs will be
harder and harder to detect. A well installed microcode bug will be almost
impossible to detect.

&lt;/blockquote&gt;
Ken was referring to the trojan modifications he embedded into the C compiler, illustrating that you need to rely on more that source code, but the compiler, the assember, the loader, all the way down to the instruction sets of the CPUs.&amp;nbsp; Or as Schneier famously pitched: &quot;security is a chain; only as strong as its weakest link&quot;.&lt;br /&gt;
&lt;br /&gt;
Who operates on a completely self-built system from software to hardware?&amp;nbsp; We would venture to say: nary a soul. &lt;br /&gt;
&lt;br /&gt;
Just a good reminder for a random Thursday, in case you forgot.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/5807862430298402825/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/5807862430298402825' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/5807862430298402825'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/5807862430298402825'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/08/classic-trust.html' title='Classic Trust'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyC28PQynaRmT54sOBAXjkq1OyhCctGd5RCsWWzVNDKfJxjn6kcSYtEXSVOAjY2YXj0_ZZDIX4hpfhkcDrh3ZHZhqo5VNcb3fHzaACPTA4ViMIvwIX-FCWA3jQBjKCPACMEThHlw2JJWEv/s72-c/th.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-7535334435393496229</id><published>2012-08-13T00:00:00.000-05:00</published><updated>2015-09-08T20:48:07.179-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Hacking Hotels</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAUix_MPu5uyZsoaDSvFFOSNfeA_VAuQbVdZuD95XgYTsiu1az0IlCyb3b3xRZEtv1qFbSmNIY7PXqkngXD4MNMt4_40pvcQUx8XMSn-GVEbf_P1A9ZR7EeZ_nExF3E53E5HNYHw6dCZ-p/s1600/brocious-onity-hotel-lock-arduino-640x353.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;176&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAUix_MPu5uyZsoaDSvFFOSNfeA_VAuQbVdZuD95XgYTsiu1az0IlCyb3b3xRZEtv1qFbSmNIY7PXqkngXD4MNMt4_40pvcQUx8XMSn-GVEbf_P1A9ZR7EeZ_nExF3E53E5HNYHw6dCZ-p/s320/brocious-onity-hotel-lock-arduino-640x353.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Breaking into a hotel room with less than $50 in hardware&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
The technical security media has been all abuzz about a recent Black Hat presentation by Cody Brocious on hacking electronic hotel door locks.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://daeken.com/blackhat-paper&quot;&gt;The original author&#39;s documentation including the paper and slides are here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s the simplified version:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;The vendor of the locks has an overwhelming majority of the market in the U.S. (chances are you stayed in a room that had this exact lock on it) &lt;/li&gt;
&lt;li&gt;The key cards use crypto for implementing the access control&lt;/li&gt;
&lt;li&gt;The mathematical aspect of the crypto is more or less fine (as is usually the case)&lt;/li&gt;
&lt;li&gt;The problem comes in managing keys (which is pretty much always the problem!)&lt;/li&gt;
&lt;li&gt;An administrative feature is easily exploited-- which is only slightly better than vendors shipping products with widely-known default passwords.&lt;/li&gt;
&lt;li&gt;An administrative maintenance device, when connected, can extract the crypto key and break the access control&lt;/li&gt;
&lt;li&gt;You can roll-you-own maintenance device on the very, very cheap&lt;/li&gt;
&lt;li&gt;Yes, this probably looks like a scene in any random Hollywood movie &lt;/li&gt;
&lt;li&gt;This will likely be a majorly expensive pain to fix for the vendor and hotels&lt;/li&gt;
&lt;li&gt;&quot;Compensating controls&quot; in this case include surveillance cameras, internal dead bolt manual locks, et al&lt;/li&gt;
&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/7535334435393496229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/7535334435393496229' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7535334435393496229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/7535334435393496229'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/08/hacking-hotels.html' title='Hacking Hotels'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAUix_MPu5uyZsoaDSvFFOSNfeA_VAuQbVdZuD95XgYTsiu1az0IlCyb3b3xRZEtv1qFbSmNIY7PXqkngXD4MNMt4_40pvcQUx8XMSn-GVEbf_P1A9ZR7EeZ_nExF3E53E5HNYHw6dCZ-p/s72-c/brocious-onity-hotel-lock-arduino-640x353.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1489897032337705045.post-428870256203392044</id><published>2012-08-08T12:00:00.000-05:00</published><updated>2015-09-08T20:04:24.339-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="complexity vs security"/><category scheme="http://www.blogger.com/atom/ns#" term="crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="key management"/><category scheme="http://www.blogger.com/atom/ns#" term="Marketing FUD"/><title type='text'>MS-CHAPv2 Crack</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxilgBAdIi0BhvAJs8bpdFEolOlELI0sS9xOvwv28VYkl8NQBHZ2Tn-WCmdax33lAiK1QE2QQFT9dAlCGL-FGZCvE7z9L8AHjeQVPH6ogcMIy7Yc0f2NGao8sjep_33fhPwRB1OVSvV16p/s1600/defcon.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxilgBAdIi0BhvAJs8bpdFEolOlELI0sS9xOvwv28VYkl8NQBHZ2Tn-WCmdax33lAiK1QE2QQFT9dAlCGL-FGZCvE7z9L8AHjeQVPH6ogcMIy7Yc0f2NGao8sjep_33fhPwRB1OVSvV16p/s320/defcon.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;It should come as no real surprise: &lt;a href=&quot;http://www.cso.com.au/article/432039/tools_released_defcon_can_crack_widely_used_pptp_encryption_under_day/&quot;&gt;MS-CHAPv2 is broken&lt;/a&gt;.&amp;nbsp; It&#39;s an ancient scheme.&amp;nbsp; If you were paying attention, you would have migrated your VPNs and Wireless networks away from it years ago anyway.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s &lt;a href=&quot;http://revolutionwifi.blogspot.com/2012/07/is-wpa2-security-broken-due-to-defcon.html&quot;&gt;a great break down of what this means to your wireless networks&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
An even simpler one is to just note that these combinations are still fine:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;IPSEC and OpenVPNs are fine. &lt;/li&gt;
&lt;li&gt;WPA2 Enterprise wireless with PEAP is fine.&lt;/li&gt;
&lt;li&gt;WPA2 Non-Enterprise (i.e. home) wireless is fine (from this).&lt;/li&gt;
&lt;/ul&gt;
And, of course, keep in mind it still takes 24 hours (right now, but that&#39;s sure to be sped up) to actually crack the DES encryption key with this exploit.&amp;nbsp; Since it&#39;s 24 hours and not 24 ms, that means an attacker will more than just casually find you and exploit you.&amp;nbsp; Your network will have to be a target first, at least to some degree.</content><link rel='replies' type='application/atom+xml' href='http://securology.blogspot.com/feeds/428870256203392044/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1489897032337705045/428870256203392044' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/428870256203392044'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1489897032337705045/posts/default/428870256203392044'/><link rel='alternate' type='text/html' href='http://securology.blogspot.com/2012/08/ms-chapv2-crack.html' title='MS-CHAPv2 Crack'/><author><name>Tim MalcomVetter</name><uri>http://www.blogger.com/profile/13417236190528979780</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxilgBAdIi0BhvAJs8bpdFEolOlELI0sS9xOvwv28VYkl8NQBHZ2Tn-WCmdax33lAiK1QE2QQFT9dAlCGL-FGZCvE7z9L8AHjeQVPH6ogcMIy7Yc0f2NGao8sjep_33fhPwRB1OVSvV16p/s72-c/defcon.png" height="72" width="72"/><thr:total>4</thr:total></entry></feed>