All posts by Oban

About Oban

Oban manages the Brownrice Internet staff, keeps the network humming, and chases his wife and twin boys around during his time off.

Recommended outdoor, all-weather web cameras

Axis Camera Hosting
Webcam Hosting

Here is a short list of a few outdoor web cameras that we recommend.   However, nearly *any* IP camera will work with our servers, so feel free to bring us your own and let us know what it is and we’ll get it to work!

The price differences generally have to do with 1) the level of optical zoom of the camera 2) the level of weather proofing and 3) the type of mount.

Continue reading Recommended outdoor, all-weather web cameras

Target Hack Phishing email scores a 9.00!

I’m super impressed with this Phishing email.  Its the best I’ve seen and if it weren’t for just a couple of easy-to-fix mistakes it would have scored a perfect 10.00!

Here’s the back story:  Target was hacked early last month.  That was big news that most people are aware of.  My wife and I were even sent new credit cards as a result.  But what you might not have heard of was the impressive level of phishing emails that are being sent out now targeting (heh, get it?) these customers.  So read along and I’ll dissect this particularly good one using our Olympic, Sochi-style scoring.  First, a screen shot of the original email:

 

Continue reading Target Hack Phishing email scores a 9.00!

Why trust your data to this small hosting company? (with video)

 

link_256Brownrice outperforms everyone.

We pride ourselves on our ability to match and surpass the big providers in speed, reliability, redundancy and support.  We’ve built our network and our data center from the ground up based on our years of hands-on experience.  We don’t use third-party data centers – only our own.  “We’re waiting for tech support to get back to us on that issue” is not a phrase we’ve ever used.

 

  • The Brownrice network is triple-redundant.  Our primary fiber connections peer in physically redundant locations; Albuquerque, NM and Denver, CO.
  • Our backup connections are via a large-capacity microwave link which uses the exact same technology that high speed financial traders use to beat the market.  This makes our network virtually unbreakable.  See it in action in this video (view the video full screen to see details):

Continue reading Why trust your data to this small hosting company? (with video)

WordCamp Albuquerque and an excellent retweet!

WordCamp Albuquerque 2013
WordCamp Albuquerque 2013

We had a great time at WordCamp Albuquerque yesterday.  As with all good conferences we attended excellent sessions, and met some very bright and enterprising people. And a bonus!  The attendees at my session didn’t seem to fall asleep, laughed a couple of times, and asked great questions.

If you’d like to see my presentation it can be viewed here (obviously minus the live crimescene hack discovery): http://prezi.com/wl2mypixdkgn

And again, a big thanks to @awhitehatter for his excellent hackery work and documentation, which made the talk much more lively.

Added post-conference bonus:  I got a nice retweet from Matt Mullenweg (the founder of WordPress):

Matt and I are total buddies
Matt and I are total buddies!

Hacked, defaced and damn happy about it!

@awhitehatter - My favorite hacker!
@awhitehatter – My favorite hacker!

Thanks to the excellent work of @awhitehatter this site was penetrated and defaced!  I’ve never been so happy to be violated.

You can see his work here: http://hacked.brownrice.com (that’s a full copy of this blog from shortly after it was hacked)

Want to know how he did it?  Well you’ll just have to come to my session at Wordcamp Albuquerque tomorrow to see all of the details.  It’ll be fun and very informative!

And don’t bother and try to break into this site any more – its been cleaned and updated to the newest version of WordPress!

Exploited!

I just received an email from a clearly smart fellow who demonstrated a Cross-Site Scripting (XSS) exploit using a vulnerability in this blog.  A user would need to be tricked into clicking on a specially crafted link which would eventually infect their computer with bad stuff.   Our up-to-now nameless white-hat hacker has got $50 in the bag, but for my presentation I need this blog’s file system or database modified.  A defacement.  I’d wager he gets it done since it looks like this exploit could lead to code injection if crafted correctly.  If so he’d get another $100, which is still up for grabs!

I’ll post the exploit tomorrow if our hacker gives permission.

Good stuff.

TWO days to get hacked! Cash reward offered!

Ok, its officially desperation time.  I’ve reached out to good-guy (and girl) hackers to hack this blog for $100 plus a small amount of fame.  If one of these “white-hats” don’t get it done by tomorrow I’ll go to the dark side.  But I’m afraid of the dark side!

Update 3: Netsparker seems to be the tool of choice for these white-hat bounty hunters to get into this blog.

Update 2:  Increased VPS RAM and CPU to handle the server scan and hack attempts!  Yes!

Update:  I’m seeing hack attempts!  Keep up the good work fellas!  Hack this thing!

This blog has seven days to get hacked

I’m speaking at Wordcamp Albuquerque 2013 a week from today.  My session is called Hacked!  How they hack it and how you clean it where I’ll dissect a real-life WordPress hack and show everyone how I suavely and bravely root out the hacker, sleuthily determine how he got into the site, and then kick him out and slam the door behind him.

However, there’s a problem.  I figured there would certainly be a WordPress hack on one of our hosted customer sites between when I signed up for the talk a few months ago and now.  I’ve waited and waited, and shockingly, all of our customers have listened to us and have been keeping up with their WordPress updates.   So we haven’t had a single WordPress hack to clean up.

So I need this blog to get hacked.  The sooner the better.

Oh, and to speed this thing along and I’ve reverted this blog’s WordPress code back to WordPress 3.0.  This blog currently has more vulnerabilities than a president asking congress to approve a bombing on a mideast country.

I’ll update this blog and our twitter account with daily updates on my situation.  Stay tuned.   This could get interesting.  Or embarrassing.