Archive for the ‘Security’ Category

Raspberry Pi WAP and Proxy

August 8th, 2015 Comments off

I decided to convert my old Raspberry Pi (also available from AdafruitAmazon and many more) into both a Web Access Portal (WAP) and a proxy for filtering traffic and gaining insight into domains access (where is traffic that comes out of my house going).

Older Pi Model B+

Raspberry Pi WAP


This setup required some capabilities

  • Internet access for the Pi
  • Wireless access for the Pi to host other devices
    • Wireless USB dongle
    • Ability to share connection/host other devices
    • Ability to serve DHCP assignments
  • Proxy through which traffic must pass (thus providing both insight and some control)



DevLink – Awesome Conference in Chattanooga

August 29th, 2014 Comments off

John Kellar started DevLink over in Nashville in 2006.  It’s a great conference.  I’ve seen presenters at DevLink in August only to catch the exact same presentations from them a few months later down at VSLive Orlando in December.  The difference in the price tag is $100-250 for DevLink and $1,500-3,000 (factoring in airfare, room and board) for VS Live.  That kind of difference is HAAARD to justify.

Thursday's Keynote



Professional Development - Convince Me


This year I’ve enjoyed a lot of AngularJS content and some architectural sessions, notably Mike Wood‘s Dependable Cloud Architecture and Rachel Appel‘s Web Runtime Architecture and Performance Deep Dive.


Security: Two-factor Authentication

April 29th, 2013 Comments off

Dan Goodin retweeted Mark Wuergler’s post last week.


This left me thinking about what most people I know understand about authentication.

In security authentication is a two-step process in which someone* claims an identity and then provides credentials by which he can be verified to be able to operate as the identity claimed.


Password Security – Are Yours Easy To Crack (Hacking)?

April 23rd, 2013 1 comment

After reading Nate Anderson‘s article, How I became a password cracker, I decided to put a blog post out to coincide with my quarterly call to my friends and readers to change your passwords.

One friend recently asked how to “know” that your password is secure without using a program that generates them or creating a password that requires you to haul around a book.  Here’s a quick set of guidelines that anyone can use.

    1. It’s easier for people to remember phrases than characters.
      Choose a phrase that’s about 15 letters long.