Post Thumbnail

John Welch over at Ars Technica wrote a wonderful post about using an iPad as a system administrator's tool, noting that Apple's tablet is "an addition, not a replacement" to the many tools that IT pros currently use to complete their daily tasks. Welch brings up points that I discovered when...

2 years ago 0 Comments
Post Thumbnail

Our own Brett Terpstra developed two SSH scripts that let you share Safari browser tabs between multiple Macs. This method is perfect for those Mac users with an iMac or a Mac Pro as their main work machine and a Mac laptop as a secondary machine for checking email, instant messaging or light b...

3 years ago 0 Comments
Post Thumbnail

Prompt from Panic is probably not an app you'll download just to muck around with and then forget. An SSH client is one of those things you either need and use a fair bit, or not at all. Described by developer Panic as "a clean, crisp, and cheerful SSH client: it helps you when you need it, and ...

3 years ago 0 Comments
Post Thumbnail

One must-have app for me with any smartphone is a decent SSH client; I wouldn't move over to the iPhone until I was sure it had one. When Zingersoft's iSSH came along and I was able to kick its tires a bit, I knew I could safely move my life over to the iPhone. RSA/DSA key import support, an X11 cli...

4 years ago 0 Comments
Post Thumbnail

Working for a large company comes with a lot of baggage, the least of which is an RFID security badge. For those small companies who can't afford such extravagantly wireless door key solutions there's another option: this DIY project completed by a team of developers at Sunlight Labs. It all center...

5 years ago 0 Comments
Post Thumbnail

Mac OS X 10.6 Snow Leopard introduced a lot of under-the-hood changes and many are not very obvious. One such change is to the authentication requirements for logging in remotely via SSH. In 10.5 logging in remotely via SSH was a pretty standard affair. In 10.6, however, security has been beefed ...

5 years ago 0 Comments
Post Thumbnail

While you have to go to quite some lengths to be vulnerable to it, jailbroken iPhones have been under fire for susceptibility to a particular SSH-based type of worm that has seen a lot of press lately. One of the developers, Ashley Towns, who helped to get the "rick" rolling, as it were, has just an...

5 years ago 0 Comments
Post Thumbnail

The internet has been ablaze with reports of jailbroken iPhones being infested with worms. The exploit takes advantage of unwitting jailbreakers who install OpenSSH on their iPhones via Cydia without taking into account all of the impacts on security. The most notable, and now famous, hole in this t...

5 years ago 0 Comments
Post Thumbnail

As inevitable as the sun rising in the East and setting in the West, an innocuous iPhone worm has been transformed into a malicious bank details-stealing virus. The second recorded iPhone infection operates on exactly the same principles as the first, as it targets jailbroken handsets with SSH insta...

5 years ago 0 Comments
Post Thumbnail

Jailbreaking an iPhone certainly brings many benefits, but it's also fraught with some peril, as amply demonstrated by a Dutch hacker who decided to go snooping around for vulnerable jailbroken iPhones in the Netherlands. While he apparently didn't actually swipe personal information or cause any d...

5 years ago 0 Comments
Post Thumbnail

Jailbreaking an iPhone certainly brings many benefits, but it's also frought with some peril, as amply demonstrated by a Dutch hacker who decided to go snooping around for vulnerable jailbroken iPhones in the Netherlands. While he apparently didn't actually swipe personal information or cause any d...

5 years ago 0 Comments
Post Thumbnail

Running a jailbroken iPhone has its risks, as a Dutch hacker has demonstrated. Specifically, he used a bit of port scanning to find jailbroken phones with SSH running in his native Netherlands. From there, he sent unsuspecting users a message that reads, "Your iPhone's been hacked because it's reall...

5 years ago 0 Comments
Post Thumbnail

Well, that was fast. Just a couple hours after we noted Palm warning against hacking webOS to allow data tethering on the Pre, the first set of instructions has popped up. It's not the cleanest hack we've ever seen -- you need to root your phone, enable SSH, and then configure your browser to run ...

5 years ago 0 Comments
Post Thumbnail

Well, that was fast. Just a couple hours after we noted Palm warning against hacking webOS to allow data tethering on the Pre, the first set of instructions has popped up. It's not the cleanest hack we've ever seen -- you need to root your phone, enable SSH, and then configure your browser to run ...

5 years ago 0 Comments
Post Thumbnail

If you work from non-secure networks (coffeehouses, airports, hotels, etc.), or if you've ever wanted to bypass a firewall (YouTube or TUAW blocked at work?) you may be familiar with SSH tunneling. It's come up more than once here on TUAW. It allows you to conduct your Internet business through a se...

5 years ago 0 Comments