Raspberry Pi Assembly Workshop

My workshop notes for a group of kids who assembled their Raspberry Pi with me and got it to a useful state. We start with Raspbian Lite, do some basic configuration on the command line, and then add the graphical user interface on-top. There are three parts to this workshop: i) assembly of the hardware

Microsoft Defending Data Privacy

In 2013 Microsoft were issued a Search and Seizure Warrant for data associated with an e-mail address. Microsoft’s GCC (Global Criminal Compliance) team responded with data that was collected from US systems, but refused to disclose data that was located on servers hosted by an Irish Microsoft entity on systems physically located in Ireland. Microsoft

Pass phrases, not pass words

People choose outrageously simple passwords for their web mail. Perhaps because they don’t care about the accounts these passwords protect, or because a standard from 1985 has conditioned us to use bad passwords. Yet a better way has existed for just as long.

Switch It Off and On Again

The attack code that was used against UkrEnergo’s industrial control systems, which in turn lead Kiev loosing power, is so well written, so modular, that Dragos suspect that it was only a proof of concept. Information Systems Security Partners agree the attackers are only testing their techniques. No matter, this high-tech attack has a low-tech