Categories
Tips and Tricks

Roll-your-own Anonymizing Email Server

This post isn’t about a specific security breach, but rather a post to educate you on how to better protect your online identity.  The term “anonymize” is used loosely for lack of a better word. TL;DR Create a unique email address that forwards to your real email for every site you sign up for. Create […]

Categories
Tips and Tricks

Automatically Change .om to .com To Prevent Malware

Malcontents are sneaky.  In their latest ploy, they are counting on you misspelling “.com” so they can send you to one of their fake domains.  So instead of going to netflix.com, you end up at netflix.om–a phony site determined to infect you with malware.  If you are not paying attention, you might not realize you […]

Categories
Tips and Tricks

Prevent Ransomware By Automatically Finding The Checksum Of Downloaded Files

Apple has already shut down the ransomware found in the Transmission torrent client.  You can easily prevent this from happening to you in the future by adding a Hazel rule to your downloads folder, which will automatically determine the checksum, so you can compare it with the one the legitimate file has.

Categories
Tips and Tricks

If You Like The Pi-hole, You Will Like Rolling-your-own DNSthingy (Netbender)

Yes, a DNSthingy (the consumer-facing name is Netbender).  It’s an (ASUS) router running some custom firmware (based on asuswrt-merlin) that does cool stuff using DNS, such as: blocking ads blocking malware, phishing, and tracking virtual relocation for viewing different content via streaming services such as Netflix, Hulu, and Pandora speeding up downloads speeding up general Internet browsing […]

Categories
Tips and Tricks Uncategorized

Get Lakeside Wi-Fi At Your Cabin By Making A Cantenna For ~$23

If you want Wi-Fi by the campfire or down at the dock this weekend, you can make a cantenna for as low as $23 (it will be more if you need some of the tools or common supplies).  You can either connect the canntena to your computer or your router.  Either method will allow you to connect to […]

Categories
Tips and Tricks Uncategorized

Detecting Wirelurker Malware

[UPDATE] It appears the command and control infrastructure has been neutralized. Palo Alto has already written a script that will detect the Wirelurker malware.  It basically scans for the files known to be malicious.  Just download the script and run it from Terminal: curl -O https://raw.githubusercontent.com/PaloAltoNetworks-BD/WireLurkerDetector/master/WireLurkerDetectorOSX.py</code> python WireLurkerDetectorOSX.py

Categories
Tips and Tricks Uncategorized

Roll-you-own Ventir Trojan Detector for OS X

Get Alerted If Your Computer Gets Infected With The Ventir Trojan With this trick, you can get alerted if your system gets infected and then take steps to manually neutralize it.  The Ventir Trojan is a keylogger, which means all of your keystrokes are recorded.

Categories
Automation Uncategorized

Folder Actions On Yosemite Broken? Use launchd Instead

My roll-your-own malware detection has been having troubles in OS X Yosemite.  It appears that it increases CPU usage to abnormal amounts.  I have come up with two alternative solutions that you may want to try. To detect many pieces of malware, you will want to monitor these folders: /Library/LaunchAgents /Library/LaunchDaemons /Users/your_user/LaunchAgents There are other folders to […]

Categories
Tips and Tricks Uncategorized

Roll-your-own LastPass Premium

Use your LastPass usernames and passwords in Safari on your iOS device without paying for a LastPass Premium subscription.  Using a bit of scripting, you can roll-your-own Last Pass freemium without paying a dime! That said, it is far from perfect (see caveats below), but it is a great way to have access to your LastPass passwords on iOS without […]

Categories
Tips and Tricks Uncategorized

Roll-your-own Defense Against Mac.BackDoor.iWorm

[UPDATE]: Advanced settings added below Get Alerted If Your Computer Gets Infected When the Mac.BackDoor.iWorm malware gets installed via pirated software, your computer and becomes part of a botnet.  While you may not be able to stop it from getting there, you can be alerted when it does and then take steps to manually neutralize it.