God is in the machine Carl Miller on the terrifying, hidden reality of Ridiculously Complicated Algorithms
Software’s Tay Bridge The Therac-25 X-ray machine killed several people around the world. All of them died a prolonged and horrible death by massive radiation overdose.
Since 2010 Markus Feilner has been sharing his Open VPN know-how in the wonderful location of the Linuxhotel in Villa Vogelsang in Essen, Germany. The wonderful hotel and training center are situated in a green and fresh park on a cliff above the Ruhr river. Its exclusive amenities range from sauna and spa to excellent food and extraordinary ideas for the evenings. (Watch the video beneath this post!)
Usually, Markus’ Open VPN training lasts for three days and covers basics, administration and advanced features of Open VPN in hands-on sessions. Whereas the first day is full of basic concepts and theory, day 2 and 3 will give participants hours of guided work with setup and exploring the abundance of Open VPN servers and clients, including deep dives into individually agreed on features.
Contact us or the Linux Hotel directly for requests about the class specified here: https://www.linuxhotel.de/kurs/openvpn/. Giving trainings at Linxhotel has always been a great pleasure, also because there are a lot of interesting and highly skilled parallel classes going on at the venue, the participants and trainers of which you will meet at lunch, breakfast, dinner, in the park or at the evening events. Linuxhotel is my favorite venue for any kind of training.
How Smart TVs in Millions of U.S. Homes Track More Than What’s On Tonight – The New York Times….
Using the Office 365 Activities API to Investigate Business Email Compromises…. MSO 365 has an undocumented API for forensics, where you can curl a user’s activity report.
Very important and insightful help for all of you that might travel to the USA or similar surveillance states. “Reduce data, encrypt, switch off and dont use biometrics“
Have an hacker explain why an “exploit” is like an access or an unwanted access permission to your system. Nice read, albeit German.
Reality update: A New Paradigm For Cyber Threat Hunting … :
“Threat hunting requires a shift to a post-infection mentality and sets of tools such as SIEM (security incident and event management), EDR (endpoint detection and response) and NDR (network detection and response). Even with these tools, threat hunting is a challenge for a variety of reasons. For one thing, these solutions are “heavy.” They require some kind of data collection that involves installing agents on endpoints and/or hardware placed on networks. This can get quite expensive for a large enterprise.“