Quantcast
Channel: Security | Thejesh GN
Browsing all 22 articles
Browse latest View live

What is open id?

Here is very good presentation by Simon about OpenId. It explains everything about OpenId a common user should know. Its big but very simple and direct. This post is from On/Off Tips which is a member...

View Article



Image may be NSFW.
Clik here to view.

oAuth Explained With An Example

The problem with using more and more social networks is with every social network you join you need to create profile then invite friends. There is no way to carry your data from one network to another...

View Article

Image may be NSFW.
Clik here to view.

RTPM – Real Time Productivity Monitor

RTPMTM – Real Time Productivity MonitorPP is productivity monitoring tool which runs on your resources computer to monitor the productivity. It helps your resources to see their RTPITM Real Time...

View Article

Image may be NSFW.
Clik here to view.

pyg2fa : Python Library for using Google Authenticator with your Web App

I have been using Google two factor authentication for a while. It’s probably the reason why I login using my Google id on every possible site I use. I can use a simple mobile app to generate...

View Article

Using sshuttle to remain Safe on Insecure Wi-Fi

Working from home mostly means working from cafes. Though I mostly tether through my mobile to get onto the Internet, it’s not always fast enough. Also bigger bandwidth does attract the geek in me...

View Article


Image may be NSFW.
Clik here to view.

Securing your wordpress with self-signed SSL certificate

I have been wanting to do this for a long time now. At last thejeshgn.com is available through https. It’s mostly done for my own use than my readers. I wanted to protect the admin screen (basically...

View Article

Image may be NSFW.
Clik here to view.

Securing your server using DenyHosts

Running an internet accessible server means you are opening yourself to crackers. Running the server in itself is a risk, so risk management is of top priority when you open up the ports for accessing...

View Article

Indian CA – NIC issues fake Google SSL certificates

I was listening to the latest episode of Security Now this morning. I came to know that an Indian CA was issuing a fake SSL certificates for Google subdoamins. Later got to know that it was NIC as per...

View Article


Image may be NSFW.
Clik here to view.

Localization Lab @ IFF

I love spreading a word about good tools. There are at least a dozen of tools that I use that I want everyone I know to use. That said most of these tools are not easy to use and/or not in a language...

View Article


Image may be NSFW.
Clik here to view.

Book: Spam Nation

Spam Nation by Brian Krebs reads like a crime thriller. For cyber security enthusiasts Krebs is no stranger. He has been writing about cyber security and crime on his blog KrebsOnSecurity for more...

View Article

Why India is so vulnerable to Cyber Attacks?

In mid-August, news reports on the Scorpène leak — over 22,000 pages of sensitive data related to India’s Scorpène-class submarines was compromised — sent the Indian Navy and the government into a...

View Article

Stop worrying and check out these simple steps to secure your mobile

Like every geek, I have been asked to set up computers for family and friends. These days I get asked about mobiles/web than computers. These are friends who want to be safe online and minimise loss...

View Article

Image may be NSFW.
Clik here to view.

Answering the Aadhaar Questions Raised by YourStory Article

I am answering questions raised by Ritesh Dwivedy on YourStory in a blog post titled 5 questions for the anti-Aadhaar brigade. It’s also available on UIDAI website. Readers may want to read that post...

View Article


Image may be NSFW.
Clik here to view.

This one small step by the government can be a giant step in boosting the...

As part of its Digital India initiative, the central government has been readying its cyber warfare arsenal. Its latest weapon is a mobile and desktop security solution that will notify, enable...

View Article

TV Appearance

I appeared on TV9, Public TV and News9 recently. In all three appearances I talked about WannaCry ransomware. There are not many technologists to explain tech on Kannada TV and hence it was important....

View Article


Dear Mr R S Sharma: Aadhaar Number has no place on the Open Web

The Center for Internet and Society recently published a report called Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar numbers with...

View Article

Image may be NSFW.
Clik here to view.

India urgently needs responsible disclosure policy guidelines for...

This year has been an interesting one for infosecurity in India. Major infrastructure services — from identity to payment services — have gone online. This is also the reason why there is a lot of...

View Article


Image may be NSFW.
Clik here to view.

Book: Spam Nation

Spam Nation by Brian Krebs reads like a crime thriller. For cyber security enthusiasts Krebs is no stranger. He has been writing about cyber security and crime on his blog KrebsOnSecurity for more...

View Article

Why India is so vulnerable to Cyber Attacks?

In mid-August, news reports on the Scorpène leak — over 22,000 pages of sensitive data related to India’s Scorpène-class submarines was compromised — sent the Indian Navy and the government into a...

View Article

Stop worrying and check out these simple steps to secure your mobile

Like every geek, I have been asked to set up computers for family and friends. These days I get asked about mobiles/web than computers. These are friends who want to be safe online and minimise loss...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images