Posts in article

Secure Computer Cluster Administration with SSH

This article compares the SSH-cluster-tools parallel-ssh, clusterssh and clustershell. SSH-cluster-tools are handy to execute shell-commands on a group of computers in parallel.

Read more online or download a pdf-rendition of the documentation.

Read more ...


Embedded System Security with Rust

Real-time embedded systems have to meet a combination of requirements that are in deep tension: they are expected to deliver timely results, observing strict deadlines, all using only very limited resources, computing power and energy. To this day, the most common programming language in this environment is C/C++ because of its zero-cost abstractions and fine control over memory layout. With the upcoming communication ability through network interfaces, an additional requirement gained in importance: security. Unfortunately, C/C++ supports some secure software design principles only rudimentary. Too many very severe vulnerabilities are directly related to the fact that C/C++ does not guarantee memory safety. To exemplify this, the prominent Heartbleed vulnerability is discussed in terms of causes, technical details and impact.

Read more ...


Mitigate the Devastating Effects of Crime Economy Through Eradicating Bitcoin

This note first analysis the preconditions for a successful regulation policy on new information technologies. We explain how the new crime economy, based on anonymous division of labour, works. By going back in history we understand that controlling the money flow is the key to mitigate organized crime. Applied to our generation the author argues, that the most efficient way to fight against this new age of crime economy is to eradicate Bitcoin by prohibiting mining.

Read more ...