Category Archives: Security

Blog Links: SHA-1 cryptographic hash collision detection by Google

By | February 24, 2017

Google puts another nail in the coffin for SHA-1. They already moved from using SHA-1 on their products but there are still a lot of places where is used by default. In a post on the Google Online Security Blog Announcing the first SHA1 collision Google researchers claim that they have a good way of… Read More »

Secure authentication using SafeNet(Gemalto) security tokens and Windows CA

By | May 4, 2016

In the following I will try to show how to generate user certificates on e-tokens by using the Windows CA. This tokens can be used after that for secure user authentication or signing. Prerequisites: – Install the Windows CA service. This comes a standard feature in Windows Server 2012. – Internet Explorer 9 and up… Read More »

A+ Security for WordPress Blog – HTTP Strict Transport Security

By | February 9, 2017

Keeping the installation of your own WordPress blog highly secure is very important. In today’s fast pace discovery of security vulnerabilities you must keep an eye on all the new security threats and update as soon as possible the security to try to cover the new threat. An invaluable tool is the security test from… Read More »