If you've been following net.news in the past twenty-four to forty-eight hours you heard about what went down at the Chaos Computer Congress yesterday - a group of security researchers figured out how to exploit the flaws in the MD5 hash algorithm to forge CA certificates, thus placing SSL encryption as we know it in jeopardy.
...right? Breaking SSL is bad, yeah?
Like many things in life (and nearly everything in cryptography) it's not that simple or that straightforward. Yes, this is bad, but it's not "go back to punchcards" bad.
Let's take it step by step. First of all …
You're getting old if you consider sleeping until 0900 'sleeping in'.
When configuring a firewall with IPTables
you have to specify the protocol before the port number(s) in each command. Do this: iptables -A INPUT -s 22.214.171.124 -p tcp --dport 22 -j ACCEPT
and not this iptables -A INPUT -s 126.96.36.199 --dport 22 -p tcp -j ACCEPT
If you don't, you'll see error messages to the effect of "Unknown arg '--dport'"
When writing Snort
rules, there are a few things to keep in mind. First of all, rules come in two parts: the …