Security and Privacy Guidelines for the Internet of Things

Bruce Schneier has published a good collection of links to IoT security and privacy guidlines on his blog:



Powershell makes it really easy to compare text-files, just use the following oneliner to compare two files:

Compare-Object -ReferenceObject (Get-Content c:pathtofile1.txt) -DifferenceObjet (Get-Content c:pathtofile2.txt)


Essential penetration testing tools

I found a good blogpost that lists the most essential tools for penetration testing:
To summarise the post, the following tools are a good start:
– Laptop
– Vulnerability scanner (OpenVAS, Nexpose, Nessus)
– Word processor (Word, Writer)
– Internet access
– Liability insurance
– Virtualization (VirtualBox, VMware, Hyper-V)
– Kali Linux and a virtual Windows PC
– Network cables and a switch