thad eirich


Using Maven to package and then deploy Ember-CLI assets as a WAR

Created at: 2014-10-17 14:21:44 UTC

Updated on: 2014-10-17 14:38:33 UTC

Recently I was asked to develop an EmberJS application for a client and one of the requirements was that the application needs to be deployed, much to my dismay, on WebLogic. I tried explaining to the client that they were better off deploying the Ember’s static assets on a separate Apache webserver, or even filtering the requests under Embers base route to an Apache on the same server. However, this was for a Java shop and I was told the application had to follow their standard deploy process. And so I began! First I created a WEB-INF in the root of my Ember-CLI directory with an empty web.xml & a simple weblogic.xml with a context root for the ember application.Web.xml <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN" "http://java.sun.com/dtd/web-app_2_3.dtd"><web-app></web-app>Weblogic.xml <!DOCTYPE weblogic-web-app PUBLIC "-//BEA Systems, Inc.//DTD Web Application 8.1//EN" "http://www.bea.com/servers/wls810/dtd/weblogic-web-jar.dtd"><we...

maven ember emberjs ember-cli cli package deploy weblogic WAR java


Installing Gradle with Eclipse 3.8 & Tomcat 7

Created at: 2014-08-14 00:41:00 UTC

Updated on: 2014-09-25 01:45:25 UTC

Today I was trying to setup a fresh Ubuntu VM with a new installation of Eclipse & Gradle for some Spring development and I ran into a hardstop.  After installing Eclipse (using the official packages from the Ubuntu Software Center) I tried to install Gradle and was met with a nasty conflict on libtomcat6-java (resolving which would meant uninstalling Eclipse & a few other packages that rely on tomcat-7). Tracing the bug back, it was originally a problem with a Gradle dependency.  The Gradle team took care of it pretty fast, however another Gradle dependency, Jetty, still has a tomcat-6 dependency with the latest build in the official repos.  Messy, messy, messy. Fortunately, Jetty has migrated to tomcat-7 in the latest build you can grab here.  If you're in a hurry and don't want to build from source, just grab libjetty-java_6.1.26-3_all.deb and libjetty-extra-java_6.1.26-3_all.deb under built files & install with Ubuntu Software Center.  From there it should just be ...

gradle libtomcat-6 tomcat 7 bugs eclipse jetty ubuntu


Searching for Truth in TrueCrypt

Created at: 2014-05-30 15:24:23 UTC

Updated on: 2014-09-25 01:45:25 UTC

What happens when one of the most trusted and, arguably, the most enigmatic security programs shutters its door within a warning?   In today’s NSA-phobia fueled privacy renaissance... about what you’d expect.     TrueCrypt is a (sort-of*) open source tool which offered several methods of personal hard drive encryption as well as several methods of obfuscation. For example, users can also add encrypted volumes to their existing hard drive which are hidden to give users ‘plausible deniablility’ in the case of punching-bag decryption.   Its originates in 2004, when it was released by a team of anonymous developers who called themselves the “TrueCrypt Foundation”.  Since then it has had a steady stream of updates, despite occasional controversy and legal problems when Brazilian bankers encrypt their files to hide financial fraud. After ten years the  identity of TrueCrypt’s developers is still a mystery.   TrueCrypt’s offers ...

security TrueCrypt open source


Cyber Acoustics- Attack Vector of the Moment

Created at: 2014-02-12 04:25:44 UTC

Updated on: 2014-09-25 01:45:25 UTC

About two months ago the net security community started to hearing some strange things about another well-known security researcher who also claimed to be hearing strange things.  That guy was Dragos Ruiu, and he was hearing his machines talk to eachother.  Not over the the internet or any audible band, he was claiming that a hyper-futuristic malware had infected his security lab, was hiding in the machines’ BIOS, and was communicating through audio to other infected, air-gapped (no networking) computers to re-propagate the virus if it had been removed.  There are a few really big claims in that statement:   1. the machines are being infected at the BIOS level 2. the malware is infecting different machines at the BIOS level (he claims it has infected at least a Windows machine and a BSD machine of different makes) 3.  the malware can communicate using high frequency sounds from standard computer speakers/microphones   Any one of those claims would be a attribute of a we...

acoustics badbios security RSA