Sometimes it’s necessary, or at least preferable, to have multiple presences on Twitter. I had to start a Twitter account for this very blog, and in order to do that I used a GMail trick I remembered from a while ago.
To set up multiple Twitter accounts on one email account using GMail:
A good friend of mine recently had his iPhone stolen. At WWDC a new feature was released that would have helped him, had he been a member of MobileMe. But here’s a solution for those without MobileMe.
If you have a jailbroken iPhone, it’s possible to run an application available by default on Cydia called “findmyi”. Using the web interface you’re able to mark your iPhone as stolen and review a map with it’s location. The findmyi GPS agent runs in the background and contacts the server at the interval specified in the options menu to record its location. Free accounts are given an estimated location, and upgrading appears to be rather simple. It also allows you to place a message on your iPhone asking for the current user to contact the owner should you wish to.
When most of us think of running a wireless network at home we starting thinking of all the buzzwords and acronyms we can use to secure them. But not me. I like to take a different approach to my wireless. Instead of thinking of it like “No one but me should be able to surf porn on my wireless” or “Those hackers are going to drive by and send spam”. None of that.
I like to think of my wireless as more of a honeypot. I know everyone gets on “free”, open wireless networks. If not because they don’t know it’s illegal but because it’s easy and, well, free. Almost an evil twin setup but it’s not pretending to be anything. It’s also an interesting challenge to keep a network functioning and protect my somewhat important things in a somewhat hostile environment. I don’t know if anyone that is connecting to my network is malicious or infected with confliker. But most importantly it gives me a reason to practice some offensive security.
Here is a simple Powershell script to modify a User’s UPN in Active Directory. To use this, you must install Quest’s Active Directory commandlets. Obviously you should always be careful when modifying active directory, and the author isn’t responsible for what you break.
First, I had a look at my DHCP server. Controlling what address are assigned to devices that aren’t mine makes firewall rules simpler. Not the best way, but I’m going for layers. The DHCP server I am using is also integrated with the firewall so abandoned and unassigned addresses are tracked. Since I don’t have a VLAN capable wireless access point I can’t VLAN but I can segment the network a bit. Small problem though. I have tried a similar setup to this before and forgotten all about this issue. OpenBSD’s dhcpd only has a global allow or deny for unknown hosts, meaning I can’t assign unknown devices to one IP range and known to another. I’m still working on that…