Bitcoin’s almost 10 year lifespan so far has subjected the technology and its’ implementation to all kinds of attack and critical inquiry. Meanwhile the value of Bitcoin as a tradable … Continue Reading Hacking Deterministic Bitcoin Addresses
Secure Shell (SSH) is an amazing cryptographic network protocol, and it undoubtedly helps secure a huge slice of today’s Internet – giving sysadmins robust remote access to their servers, but also so much much … Continue Reading Hardening SSH on your Ubuntu Server
Whenever I’ve had the task of personally assisting someone with remediating a compromised web server, I can’t help switching into researcher mode. I want to know how the attack has … Continue Reading How to replace malicious PHP pages with sneaky POST data capture