• Business,  Mac Security,  personal

    Be A Good Patriotic American By Renting Sony’s The Interview

    Recently I’ve read a lot of things about the attacks against Sony. I’ve read that they’re nothing more than extortion attempts by hackers that probably live in their parents basements (based on the fact that the initial demands didn’t mention North Korea at all). I’ve read they were orchestrated by China by people who felt North Korea was being picked on and couldn’t stand up for themselves. I’ve read highly unconvincing reports from the FBI that they were orchestrated by North Korea. No one really knows. I can send traffic to servers from anywhere in the world. Anyone can anonymize their web traffic as easily as using a ToR plug-in…

  • Mac OS X,  Mac OS X Server,  Mac Security

    How to Crack a DMG Password

    A dmg file is a compressed file structure, capable of containing folders, files, etc.  Dmg files can be used for a variety of purposes, from encrypting a home directory (ie – FileVault) to encrypting a file structure manually.  A dmg file can be encrypted fairly simply. From Disk Utility, create a dmg file by clicking on the File menu and selecting New and then Blank Disk Image. This will bring up a screen where you can provide a name for your home folder and a size, then select either AES 128 or AES 256, which is a bit slower. Go ahead and click on Create and then at the resultant…

  • Mac OS X,  Mac OS X Server,  Mac Security

    Mac OS X: Spoofing MAC Addresses in 5 Seconds

    Every hardware network adapter has a unique MAC address.  However, they’re not always what they seem.  According to Wikipedia: MAC Spoofing is a hacking technique of changing an assigned Media Access Control (MAC) address of a networked device to a different one. The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer. I was talking to someone the other day about security and the topic of spoofing MAC addresses came up.  They seemed to discount that this was usually a concern except for in super secure environments because they considered it an extremely complex process.  Here’s my answer to…