We like to use the best operating for the job and we use a mixture of Windows, Mac and Linux.  Our typical Linux installation is a virtualized system and it does not include a desktop; we do all of the administration from the command line.

    The other day, we were asked to propose a solution which installs on Linux but the installation must be performed from a Linux desktop.  No problem, we installed the desktop package with the following command:

    You've run a tool, such as ZAP, against your web site in an attempt to harden it and you discover your site is prone to 'clickjacking'. 

    A quick search reveals:


    The malicious practice of manipulating a website user's activity by concealing hyperlinks beneath legitimate clickable content, thereby causing the user to perform actions of which they are unaware.

    I recently came across an Apache web server with a number of virtual hosts under /var/www.  Pointing a browser to the root, /var/www, would reveal all of the names of the virtual hosts on the server.  While not tragic, it does reveal some information that we would prefer not be visible to the general public.

    We have several clients using OpenVPN in one form or another but I was playing around with the OpenVPN appliance available for download here:


    As a side note -- they warn you against using VMWare Player.  While I didn't use Player, I was testing it out in VMWare Workstation 11 and it works perfectly. 


    Spear Phishing is a targeted email attack and the message will typically come from someone you know.  We’ve been seeing this type of attack more frequently and the latest one had an interesting twist.  Using our domain, sevenlayers.com and changing the names to protect the innocent, the email was crafted as follows:

    On more than one occasion, I've been remote to a machine and needed to pull the service tag.  Dell has a mechanism on their site which can get that information for you but I seem to recall it only works when you're physically on the machine and not accessing it through an RDP connection.

    Since I access almost every machine while being remote, you can see how that poses a problem.

    © 2020 sevenlayers.com