One person – many ideas!
Try Hack Me – 100 days after
I started the endeavour into the world of online hacking training/games back in December. Now, 100 days later, I will give a short update.
Bash faulty pasting tip
Have you ever pasted some random multi-line text to the bash shell ? If you have, then you will know how annoying this is. So here is the fix!
Computer Security – for fun and profit
So I have been interested in computer security, hacking, cracking, preaking and everything around it since my early teenage years. It has mostly been for the fun of it and not something I would use for bad things. Back in the early days (mid-90es) security was just beginning to be a thing so defacing a […]
Official U2F/FIDO support in OpenSSH
U2F/FIDO2 support is now officially available in OpenSSH.
OpenSSH support for U2F/FIDO2
Finally, you can use the your soloKey or other U2F key with openSSH. It is still very early support so you will have to do a bit of compiling yourself. Here’s how!
Edward Snowden in Joe Rogan show
An fantastic interview with Edward Snowden for the Joe Rogan show. Almost 3 hours about the mass-surveillance going on in this world.
Happy Birthday UNIX – 50 years
Who would have known that a fun project (originating from a computer game idea) would end up 50 years later as being the ground work for most modern operating systems? Happy Birthday to UNIX 50 years.
Password-less linux login with SoloKeys
Sometimes a hardware key is not for added security but simply for added simplicity. This time I give a quick intro to how you can use a SoloKey (or other U2F/FIDO2 HW key) as a quick Linux login mechanism.
Using SoloKey for Linux Login
If you want to have extra security for your linux machine besides the usual password. Then get yourself a SoloKey or other hardware U2F key and use that as secondary login. Here I give you the description on how to install and configure everything for using Solokeys with your linux. Enjoy!
Security keys – everyone should have at least one!
I spend a lot of my time on IT security and related subjects. This is also why you will always find at least 1-2 hardware security keys on me when I move around. This time I tell a bit about the three types I primarily use.