You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

Category Archives: Interesting Tech



I started developing a random idea over the holidays but never finished it. I’m releasing its description here with the hope that someone will steal and then implement it :) a hybrid social media platform using rss feeds, twitter style messaging and public, private, and group key pair cryptography. it also solves the paradox of […]

Granted Wish: Traceroute pickling in scapy

A friend of mine sent in a script that worked for him. #!/usr/bin/env python import scapy, pickle # pickler tr, un = scapy.traceroute([“”]) f = open(“/tmp/pickle-out”, “w”) p = pickle.Pickler(f) p.dump(tr) f.close() # unpickler f = open(“/tmp/pickle-out”, “r”) u = pickle.Unpickler(f) tr = u.load() print ” Original tr:—————————-” tr.display() I still couldn’t get this to […]

A court ordered someone to switch to Windows to enable monitoring

A friend shared an interesting post with me from Ars Technica about a recent torrent website owner getting jailtime . One of the more interesting facts from the article was the disposition of a previous case in 2007 which somehow escaped my attention back then. Scott McCausland was forced to have his computer monitored as […]

Tenable alters Nessus plug-in licensing. Still not Open

Dear Nessus Community, On behalf of Tenable Network Security, we would like to thank you for making Tenable’s Nessus® vulnerability scanner the most widely used scanner in the world. Over the last five years, we have seen Nessus grow globally to over 5 million downloads and we have been there every step of the way. […]

wget recon technique

I was looking for a novel way to recon a network for webservers and came up with a command line combination involving wget and find. The first stage is to use wget and download the index page of any server that responds. The second stage is to remove all the zero length files that will […]

Basic Ubuntu Server Hardening

This is a basic level of hardening for Ubuntu servers and should be considered a baseline. This tutorial will cover two topics: SSH and Firewall. This tutorial was prepared using Ubuntu Server 8.04 beta. SSH edit the ssh daemon configuration file to move the ssh port away from 22. Most worms or bots are programmed […]

mouseHole: A ruby web proxy

I have been thinking about writing a web proxy for a while. There are several projects that all involve web proxy technology. So tonight while searching for a simple one I found exactly what I’m looking for. mouseHole. There are a lot of dependencies so be sure to run the following script. echo “installing ruby […]

TrueCrypt finally coming to Mac OS X

Release scheduled for: February 4, 2008 Unfamiliar with TrueCrypt? Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire hard disk partition or a storage device such as USB flash drive. Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an […]

Wireless Resources

Wireless Users Groups Bay Area Wireless Users Group NYC Wireless Group Personal Telco Project FRARS Wireless lan working group Boston Area Wireless Internet Alliance GBA 802.11 Greater Boston Area 802.11 Wireless Database DC-WiFi Initiative Public WiFi advocates in Washington DC Seattle Wireless Seattle Wireless group Wardriving Resources Wardriving news […]

Remote Desktop Connection (RDC) Settings

Remote Desktop connections support three security settings: * The low security setting enables 40-bit or 56-bit encryption of all data transmitted from the client, such as keyboard and mouse data. * The medium security setting enables 40-bit or 56-bit encryption of all data transmitted between the client and server. * The high security setting provides […]