It seems like everyone (online and offline) is talking about the "Heartbleed" SSL bug. To over simplify how it works, a malicious user or program can make a call to a remote server and request information from it's memory which can include information such as encrypted versions of a username and password.
The following XKCD comic does a great job in making this bug more understandable for those that might not understand the technical underpinnings of SSL.
If you want to know what to do, there are a few things you should know. First of all this bug only effects Linux servers using an older version of an open source SSL implementation. So not all web sites are effected, because its not a problem with the SSL technology.
Second, most of the large popular sites that were effected by it should have patched their servers by now. Some sites have already send out notifications to users to change their password.
If you're worried about a specific web site/account, go ahead and change it just to be on the safe side. When dealing with the Internet it never hurts to be too careful.
Friday, April 11, 2014
Monday, April 07, 2014
Note: This tool requires an understanding of IPv4 networking to utilize it.If you have a small home or business network, and need a way to find all the devices that are attached to it, then you can use a program called a "network scanner". It will try to find all the visible devices (i.e. without a firewall blocking outside network access) on a network using various different techniques.
A simple way of mapping the visible devices on your network, that doesn't require the use of any extra tools. Paste the following line into the command prompt:
for /l %i in (1,1,255) do @ping -n 1 192.168.1.%i | find /i "bytes="Notes:
- You might have to modify the text in red so matches the network segment you want to scan.
- There are more robust 3rd party network scanners available. Check your favorite tool site to see what they may offer.
- Another trick that can be use to find out this information check your router or DHCP server to see what devices have requested a dynamic IP address.