WordPress GRRRR's !!!! and where have I been ?

Well I just had a battle with my wordpress cache plugin GRRR
sorry if you tried to visit my page and the front page just showed blank

Darn Plugins !!!!

In other news sorry I have not been on for a while been crazy busy lately with work and life

See the latest article in Motherboard on Anonymous attacking Brazilian websites and sponsors of the world cup websites

http://motherboard.vice.com/read/anonymous-strikes-world-cup-sponsors-and-Brazil-government

I will be posting new videos soon !!!!

See you soon !

The Awesome Cisco Emergency Communications Truck!

Hey All,

As I said in my previous Post I was recently at Cisco connect 2014
This event was awesome I learned a lot and I got to network with some really cool people and got to see the new innovations from Cisco I am super hyped about the future with the Internet of everything but am also kind of worried lol I can see it now the bot-net of internet connected fridges attacking a website …… thinks its not possible do you ,,, haha

Here are some images of the Cisco Emergency Communications truck

CAM00215

CAM00214

CAM00212

CAM00211

This truck is complete with satellite up-link a full ip network ready with ip phones 3g and video conferencing this was truly a awesome sight the truck was shown in working order they even had a box that allowed UHF VHF AM and FM to talk to each other !!

I thought I would share this I will post up more about the conference when I get the chance

Till then
Stay secure !

Heart Bleed Virus/Exploit

Hey Everyone,

I am a little late to post this warning but recently there has been a vulnerability in the Open SSL application that allows hackers to exploit SSL and capture data even though it is supposedly secured via a SSL certificate
The hacker can exploit this flaw without leaving a trace no logs or security appliance that is vulnerable to this flaw would be able to detect that it was happening or it has happened the exploit allows the attacker to leak the information from the server memory to the client and vice versa

The exploit name is Heart bleed

At this point all major websites like Ebay/Paypal have been notified and most have taken action to patch this vulnerability

This requires all web-server administrators to update their software on the affected web-server and revoke and renew their SSL certificate this will resolve the bug and re-secure the web-server

For users who want to know if the website they use is affected they can use this web tool http://filippo.io/Heartbleed/
This will check if the server administrators have patched the server and updated the certificate

All users should reset all of their passwords for each site that has tested Ok with the tool and while you are there if that particular website has 2factor authentication as an option now would be a great time to enable it as if the user had this enabled your account would be safer

For server operators you must take action now see below for the link to update your open ssl libraries
https://www.openssl.org/news/secadv_20140407.txt
after then you must revoke your certificate and have one re-issued

See below for statement from Open ssl

A missing bounds check in the handling of the TLS heartbeat extension can be
used to reveal up to 64k of memory to a connected client or server.

Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
1.0.1f and 1.0.2-beta1.

For more information see the CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160