SSH Protocol - RSA Signature Algorithms

I’ve been working on a project to phase-out the use of the ssh-rsa signature algorithm in an environment where hundreds of automated file transfers are performed using SFTP, the standard file transfer protocol for use with SSH. The motivation for doing so being that ssh-rsa (as a signature algorithm) uses...

Microsoft Excel Workbook Encryption

I recently found myself considering how a non-technical user of Microsoft Windows in a business environment might go about encrypting text within a file. Since Microsoft Office has a rather ubiquitous presence in the workplace I decided to look into what it had to offer in terms of producing encrypted...

SSH-Audit Algorithm Look Up

ssh-audit is an open-source command line tool written in Python for performing SSH client and server auditing. I recently contributed a new feature that provides a means of looking up an SSH algorithm name and returning the information that ssh-audit holds on it.

Get Scheduled Task Path in VBScript

I’ve a number of VBScripts that run as scheduled tasks. Whenever these scripts logged an error, it would take me some time to identify exactly which task invoked the script. I therefore wanted to update the scripts error logging to capture the scheduled task path. I wanted to avoid hardcoding...

TLS Cipher Suite Naming Conventions

The IANA (Internet Assigned Numbers Authority) is responsible for maintaining the official registry of TLS cipher suites. If a cipher suite is approved by experts at the IETF (Internet Engineering Task Force) then the IANA add it to the registry where it’s assigned a unique two byte hexadecimal value and...

Copyright © 2018 - 2022 thecliguy.co.uk
For details, see Licences and Copyright