Browsed by
Category: Computers

Here at Aetacraft we have interests in more then just games we also like to talk about computers and IT technology. If you have any computer-related questions or just want to talk to other people in IT. This is the place.
Splunk + Minecraft?

Splunk + Minecraft?

Hello everyone! Today I’ve been spending a lot of time working in my home lab (as I so often do). And I’m pleased to report that I have learned many new things about the rsyslog package available (and often preinstalled) on most in Linux distributions. What is rsyslog? rsyslog can send it’s logs over to virtually any type of syslog server on the market. Including more advanced systems such as Splunk and other SIEM products. That doesn’t come as a…

Read More Read More

Authentication Mechanisms – How Secure are They?

Authentication Mechanisms – How Secure are They?

Hello everyone! Recently, I’ve been reading about the Digest Authentication mechanism (RFC 2617) after reading the Account Password Policy section of the Windows Local Computer and Group Policy Object (GPO) editors piqued my interest. RFC 2617 describes two primary authentication methods: Basic and Digest. Basic Authentication Basic is as simple as it is insecure. Basic transfers the specified username and password in PLAINTEXT unless of course surrounded by a layer of encryption such as SSL/TLS. Which I’d STRONGLY recommended you…

Read More Read More

Ultimate Build 2019 – pfSense

Ultimate Build 2019 – pfSense

Sometimes it is fun to take a short break from the (somewhat) sensible world we live in and do something that is truly crazy and having a bit of fun the process. Today I really turned it up a few notches and decided to design, price out, and analyse a truly insane pfSense firewall build!

Increased Demand for Biometrics

Increased Demand for Biometrics

Hello again my kind readers! I’ve recently found out that Biometrics are rapidly becoming the world’s favorite method of authentication in a digital world. I for one am not for this form of authentication as I’ve made clear once before. While Biometric technology may technically be more secure and easier and in some cases (such as logging onto a public computer – especially from the Windows lock screen). I do have a couple of problems with it (primarily regrading security…

Read More Read More

Carbonate Buys Webroot

Carbonate Buys Webroot

I usually don’t go into Windows (especially in terms of security). But I find this article really interesting. Apparently Carbonate has bought out Webroot. I don’t know what exactly they plan on doing with it. Perhaps they plan on using Webroot as part of their product as sort of an Backup/Anti-virus solution (Anyone remember Norton Backup?) Either way, as always with technology it will be interesting to see what will happen.

The Cost of Cyber Attacks

The Cost of Cyber Attacks

This week I read an article on SecurityMagazine.com that claimed that the average cost of a cyber attack has now exceeded $1 million dollars. While this an extraordinary amount of money (which could be VERY detrimental or even fatal to many businesses, with only the possible exception to only some of the largest companies out there). While this once again stresses the importance of cybersecurity. And shows us how once again, the threat has grown. I also find it very…

Read More Read More

How to use PGP

How to use PGP

Hello everyone, hope you are all having a good day today. Recently I’ve been playing around with encryption. Specifically PGP encryption. It’s a bit embarrassing for me to admit this but, while I understand symmetric encryption, when it comes to asymmetric encryption that is a bit foggy to me. I always seem to forget what the difference between public and private keys are. Which one do you send to people? I know that it’s the public key, but it doesn’t…

Read More Read More