Stop asking your students to write command line UIs
How often have you used a UI like this?
Insecure Links Highlighter browser extension
Insecure Links Highlighter simply puts a thick red border around insecure links on all websites:
How to recover password after shortening
Writing secure software is hard. At the same time, some things are so fundamental that failing to implement them is just inexcusable. One of these is that you must not limit the password length. (At least below some crazy limit like a thousand characters. Long before that your password is no longer the weakest link in even the most secure systems in the world.) Enter my new router, ironically named the Orcon Genius. It's a bog standard consumer router, and like most routers it came with an insecure admin password. I promptly replaced it with a long, generated password, but afterwards I could no longer log in. I suspected a shoddy implementation, so I cobbled together a script to try logging in using every substring of the password. After about half a second it spat out the correct password, verifying that this router only saves the first 15 characters of the password. The script is very simple:
These companies work against your freedom
Most companies have never done anything sufficiently evil to deserve going on this list. This list is reserved for companies which have done at least one thing that was so bad they should not be forgiven for it. I will try my very best never to do anything benefiting them economically, and I hope you will too.
How broken is Samsung UK support?
This is how broken:
The HTTPS-only experience
EFF recently announced that "We're Halfway to Encrypting the Entire Web." As a celebration of this achievement I've started an experiment: as of yesterday, no unencrypted HTTP traffic reaches this machine*.
When MFA is not enough
I hope you'll excuse the format of this post. Coffee does strange things to my brain.
Full disk encryption with Arch Linux footnotes
Pavel Kogan has an excellent guide to install Arch Linux with full disk encryption. I've taken the liberty of copying the instructions, adding a couple tweaks:
Shell scripting dos and don’ts
Shell scripting is like a room full of power tools: handy but dangerous.
Save your bookmarks on Pinboard!
Why? Check this out: