Welcome HaaS

Or, to be exact, you could welcome it last October, when we released its beta version. In the beginning, we were debugging it, while leaving the registration free, then came the stress test in the form of moving of all users of the Turris routers. We resolved all the issues and considered the suggestions, so nothing was in the way of launching HaaS — Honeypot as a Service.

Almost 4 million new gTLDs disappeared in 2017

Last year was not a good year for new generic domain names (new gTLDs). While a number of domain names became available for registration, the total number of new domain names decreased for the first time in its history. While there were 27,710,468 domain names registered at the beginning of the year 2018, only 23,823,948 saw the end of the year. Domain holders in the Czech Republic had a total of 23,245 new gTLDs registered, i.e. less than 0.1 %.

For our children to continue using the Internet

The time before the GDPR enters into force is relentlessly ticking away. Do not worry, in this post I am neither going to paint scary pictures of what companies will have to face, nor make a list of what you should forget about when this law is enacted; I will “just” focus on the processing of personal data of children, namely the Article 8 that regulates the conditions for granting consent with processing of the child’s personal data in connection with information society services.

Your Own Certification Authority in a Letsencrypt Style

Have you ever thought of automating the certificate issuing in your organization’s internal certification authority? How about using the same procedure as in Let’s Encrypt and the ACME protocol, while enjoying all the benefits ACME has to offer? The possible solution is to use Boulder. I will now try to break down for you the Boulder’s installation process and the pitfalls that I encountered during the setup.

Suricon: Practical experience with cybersecurity in manufacturing and companies

One of the most comprehensive open source intrusion detection systems Suricata held its annual conference in Prague. And because CZ.NIC intensively uses Suricata in its Turris routers to protect users, we have become a proud partner of the event. There, we shared our experience with other Suricata users and showed the technological solution of the Turris Omnia router, where Suricata can be operated with ease.

Looking back at the Cybercompetition finale

A golden opportunity: the bank we’re about to rob is moving to new premises today. To our luck, they’re also testing alarms until 4 PM, so it won’t be suspicious if we accidentally set one off. There is an open window on the first floor protected by a single sensor. Our inside man among the staff has placed an IP camera into the sensor cabinet, so we can see if the sensor we are trying to break has the ‘status OK’ or the alarm is screaming. The IP camera is streaming to YouTube — alas with a delay. The problem is that the sensor communicates via radio waves: every 15 to 30 seconds the diode beeps and the device sends a signal. We’re listening, trying to imitate it, and when we’re sure, we’re gonna shut down the sensor and turn on our little imitation that we built. What is left is just to arrange the tin foil between the antennas, like this… the sensor alarm’s blaring! We are holding our ears and will try again in half a minute.

Pexeso: cyber education through play without a computer

Today’s children often learn to play a video on a tablet before they utter their first sentence, and game applications are often more popular among our little ones than toy blocks. When the parents find out that a cute hat for a virtual doll has deprived their account of an amount exceeding the price of some real fashion accessory, they start taking an interest in the security settings and in what their kids do on the computer.