Pexeso: cyber education through play without a computer

Today’s children often learn to play a video on a tablet before they utter their first sentence, and game applications are often more popular among our little ones than toy blocks. When the parents find out that a cute hat for a virtual doll has deprived their account of an amount exceeding the price of some real fashion accessory, they start taking an interest in the security settings and in what their kids do on the computer.

New additions to the user community of the FRED registration system

Last year, our open source FRED registration system experienced a success in Togo, Argentina and Malawi. In particular, Argentina, as the eighth largest country of the world, made us very happy. Argentina is now the largest domain register that uses FRED apart from us. Since we have information from countries that have been testing our system for a long time, we were quite surprised to hear from Macau at the beginning of this year that they managed to complete the installation and transition and are planning to run production soon. The .MO domain registry is the first Asian destination of our product. Shortly thereafter, we learned of another registry in Africa that managed the transition to FRED. It is a small land of Lesotho using the .LS domain. Let’s look at these new additions to the FRED user community in more detail.

IETF 99 in numbers

Last week, thanks to the IETF (Internet Engineering Task Force) conference, Prague became the center of the Internet community. It was for the fourth time that the Czech Republic was given the honor to host this important meeting where RFC (Request for Comments) standards are created: Prague hosted it in March 2007 (68th IETF), 2011 (80th IETF) and July 2015 (93th IETF), with our Association having taken part in organizing the last three meetings.

How was the #TurrisHack17 ?

Since the beginning of the Turris project, we have been very happy for the opportunity to cooperate closely with our community. Without it, the project would not have been where it is now. It was largely the interest of potential users that pushed us to start a campaign on Indiegogo and, again, it was the community that enabled the campaign to become so successful. This success also helped to significantly broaden the community of users and expand it from the Czech Republic to the world.

What do Postel, IETF and today’s Internet have in common?

On July 16-21, 2017, the IETF 99 conference will take place in Prague. What IETF is and how it works has been already explained by my colleague Ondřej Surý in Czech Cesta do hlubin IETF, Odkud pochází internetové standardy (aneb bylo jednou jedno RFC) or Vrána k vráně sedá aneb koťátka, dogy a nápoje v IETF. Ladislav Lhotka, in turn, described its unusual geeky atmosphere IETF: internet podle mručící většiny. So it is enough to mention that IETF is an organization that publishes Internet standards. Its goal is to create quality technical documentation that influences the development of the Internet and its applications.

From honeypots to router analysis

It all started when we received a response to one of the automatic e-mails generated by our honeypots when they detect an attack attempt or suspicious behavior. These notifications are sent to abuse contacts of the network from which the attack originated. Portscan of the WAN interface:

Impressions from the Locked Shields 2017

Locked Shields is the largest international cyber security drill. It is regularly organised since 2010 by NATO CCDOE (Cooperative Cyber Defence Centre of Excellence), and the focus of the drill is a clash between two teams. The red team attacks the blue team, which plays the role of the defender. This year, the drill was attended by a total of 19 blue teams. The teams were charged with the defense of a diverse computer infrastructure of a fictional country’s military base consisting of different servers, numerous workstations, SCADA systems, etc. The defenders were to face attackers, whose objective was to damage, compromise, or completely take down the network or its elements, or at least to make things complicated for the defenders. In addition to the technical part, the drill is focused also on strategic decision-making, cooperation with the press and the handling legal matters. We were invited by colleagues from GovCert and assigned to the “Linux team”.