Category Archives: Uncategorized

Recovering data from a corrupted USB thumbdrive using ddrescue

A friend asked me for help. He has a USB thumbdrive that he used for backup and when he plugged it into his Windows system, Windows wanted to re-format the drive (and therefore erase his backups). Obviously a sub-optimal solution, … Continue reading

Posted in Linux, System Administration, System Engineering, Technology, Uncategorized | Tagged , , , , , , | Leave a comment

LetsEncrypt + Amazon EC2 = SSLLabs A Rating

I wanted to easily add web security to a static AWS EC2 website to improve the search rankings. I found a guide by Ivo Petkov however there were a few problems with his instructions. I followed his advice: sudo yum install … Continue reading

Posted in Linux, Security, Shell Scripting, System Administration, System Engineering, Uncategorized, Web Security | Tagged , , , , , , , | Leave a comment

RSA Breach

RSA/SecurID data has been compromised. What does this mean?? Security researchers have been discussion the latest news about hackers getting data from RSA related to the SecurID authentication token. I have one and used it for years. The SecurID fob … Continue reading

Posted in Hacking, Security, Uncategorized | Tagged , , | Leave a comment

New Blog location

I moved my blog to here.

Posted in Uncategorized | Leave a comment

My Prediction on Apple’s tablet – what should it do?

I can’t resist.  With all of the buzz, I might as well add to the noise. Here are the features of the new apple tablet. It’s large, flat and thin. Like the air, but thinner. It’s great to watch videos … Continue reading

Posted in Uncategorized | Leave a comment

My Prediction on Apple's tablet – what should it do?

I can’t resist.  With all of the buzz, I might as well add to the noise. Here are the features of the new apple tablet. It’s large, flat and thin. Like the air, but thinner. It’s great to watch videos … Continue reading

Posted in Uncategorized | Leave a comment

FDA and Cybersecurity – a perfect match?

Companies that develop products used to maintain our infrastructure have a big problem. The security of the infrastructure is 10 years behind the times.  There are three types of companies: Some companies don’t care about security. Some make a token … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment