Moving Zimbra 8.0.9 to Zimbra 8.6 on a new server

Moving Zimbra 8.0.9 to Zimbra 8.6 on a new server

Disclaimer: I have the NETWORK/pro version but chose not to use the backups. This method should work with both the free and paid version as a result.  We perform offsite backups and use tar to handle the sparse 80GB ldap file.  This can run hot without the

Read More » Moving Zimbra 8.0.9 to Zimbra 8.6 on a new server

Moving Zimbra 8.6 to Zimbra 8.7.1 on a new server

Moving Zimbra 8.6 to Zimbra 8.7.1 on a new server

Disclaimer: I have the NETWORK/PRO version but chose not to use the backups. This method should work with both the free and paid version as a result. I have used a variation of this for every update since version version 7. We perform offsite backups

Read More » Moving Zimbra 8.6 to Zimbra 8.7.1 on a new server

Key Size in Crytpography

Key Size in Cryptography Simplified Cryptography Primer

In asymmetric or public-key encryption there are two main parts:

Encryption Algorithm (RSA, ECC, …) Cryptographic key pair

The two keys of the same key pair are strongly interconnected and are used together to achieve different properties:

confidentiality (message received by intended parties) authenticity (guarantees identity of the

Read More » Key Size in Crytpography

Browsers Do Not Care About Our Privacy

Your Privacy and your Web Browser is a Contradiction

I am mad as hell about WebRTC and google chrome.  I know this is a rant but it is disturbing that this is happening without any real regard to our privacy with new attack vectors being discovered every day from our browsers. Every browser is moving in

Read More » Browsers Do Not Care About Our Privacy

Crypto Jargon

Crypto Jargon Hash Functions

A hash function is a completely public algorithm (no key in that) which mashes bit together in a way which is truly infeasible to untangle: anybody can run the hash function on any data, but finding the data back from the hash output appears to be much beyond our wit. The

Read More » Crypto Jargon

Security Pages that Count

Security Pages that Count

With so many sites that offer helpful security information, this is my start of the must read sites.

Latest Reports ThreatPost – latest news of exploits HackerNews Browsers How they Work Browser Security Handbook Best Practices SSL Deployment Guide SSL Problems Survey of the SSL Implementation of the Most Popular Web

Read More » Security Pages that Count

Web Browser Security for the Layman

We hear that the connection between our browser and a website like amazon.com is encrypted when we use https but how does that actually work? Learn about certificates and encryption in easy to understand terms.

Read More » Web Browser Security for the Layman

Building vs Buying a Dropbox Solution

Building vs Buying a Dropbox Solution

Privacy, Security, Control, and Easy are trade offs we need to make on deciding our best solution.  Recently, I found this option in cloud hosting from a NANOG  thread. After installation and observing the speed, I was more impressed and wanted to know more and found this video of

Read More » Building vs Buying a Dropbox Solution

Self-Signed Certificates can be Useful

Self Signed Certificates another Layer

There is a lot of Internet press from companies and experts alike that self-signed certificates have to go away. It is a little unfair because they do have their place and if used within these limitations might even increase your security for certain edge cases. A few things to remember

Read More » Self-Signed Certificates can be Useful

Zimbra 32 to 64 bit migration version 2

Migrating Zimbra 7.2 32bit to 64bit on centos 6.5

I did this procedure before and I had a longer outage than I wanted. This time, we are doing it without taking down the old server with a very slight outage for just a few minutes.  I also use front end non zimbra MX mail servers

Read More » Zimbra 32 to 64 bit migration version 2