Remove 2013 Remove Authentication Remove Open Source Remove Operating Systems
article thumbnail

Technology Short Take #25

Scott Lowe

I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). Operating Systems/Applications. OpenStack Summit 2013: Building HA OpenStack with Puppet in 20 Minutes. If you’re seeking more information on UAA, this looks like a good place to start. Technology Short Take #25.

Storage 92
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. You want to automate the HVAC system for remote access. Vamosi: The book Practical IoT Hacking is full of useful examples.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. You want to automate the HVAC system for remote access. Vamosi: The book Practical IoT Hacking is full of useful examples.