One-to-one NAT mapping per client if you really want this to work right…
-
-
Mac Backups: HFS+
Tivoli, Backup Exec, NetBackup – they don’t backup resource forks. So if you need your resource forks (and you probably do) then look towards a Mac backup app, like Retrospect, Bakbone, Atempo or Archiware.
-
What is a Kerberos Realm
A realm is where the kerberos database is stored. The realm lives on one computer (KDC) and can have read-only slave servers (kinda’ like a cluster). Each realm will have a listing in the following files /private/var/db/krb5kdc/ .k5.FQDN.OF.REALM (secret key) kdc.conf (configuration file for the KDC) kadm5.acl (access control list for KDC)
-
Download Kerberos
Download it here: http://web.mit.edu/kerberos/dist/
-
Using SSH to access GUI tools
ssh -X serveraddress gui-tool
-
Interview with SANS Leadership Lab
Interview I did with Stephen Northcutt of the SANS Institute: http://www.sans.edu/resources/leadershiplab/osx_security.php
-
A Brief History of Modern Cryptography
I originally posted this at http://www.318.com/TechJournal Cryptology is derived from the Greek words kryptos, which stands for “hidden†and grafein, which stands for to “writeâ€. Through history, cryptography has meant the process of concealing the contents of a message from all except those who know the key. Cryptography is used to protect e-mail messages, credit card information, and corporate data. Cryptography has been used for centuries to hide messages when they are submitted through means where they might be intercepted, such as the Internet. But encrypting email messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time you check your…
-
Build Your Own PAM for OS X
Despite the deep hatred for the in-state rival, I must admit that Georgia Tech has done something nice for the community here: http://www.math.gatech.edu/~villegas/pam_krb5
-
FTK
From the FTK Website: Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensic investigation technology. This court-validated platform delivers cutting edge analysis, decryption and password cracking all within an intuitive, customizable and user-friendly interface. In addition, with FTK, you have the option of utilizing a back-end database to handle large data sets. Or you can work without one if application simplicity is your goal. Either way you will get the benefit of best-of-breed technologies that can be expanded to meet your ever-changing needs. Known for its intuitive functionality, email analysis, customizable data views and stability, FTK is the smart choice for stand-alone forensic investigations.
-
SANS Course on Mac OS X Security
I originally posted this at http://www.318.com/TechJournal The SANS Institute recently released a course by Charles Edge (er, me) on Mac OS X Security Fundamentals. The course is described in the following manner: “SANS is the leader in Information Security. This course on securing Mac OS X is the fastest way and most comprehensive way to get up to speed on applying the principals of the information security industry to the Mac. Written and taught by one of the security veterans of the Mac community, this course covers how real world security concepts are applied to the Mac with real world examples from the Mac community. The course offers a balanced…