Archive for August, 2013

I very often enjoy watching all bunch of anime. I don’t really read manga, because I can’t afford to carry all those paperback with me all around. I wanted to start a youtube series on my own, targeting precisely the review of anime and other SciFi-related productions, from Japan or elsewhere.

But a first search on youtube actually got me to this guy’s ย channel: bobsamurai. One can clearly see he is passionate about anime and manga and a true collector of figures and gadgets related to anime. The most recent post I’ve seen of his is the Top 5 Vampire anime. I know, it’s published last year, but I don’t exactly watch stuff chronologically ๐Ÿ™‚

I couldn’t help but think about my own top 5. I can’t maybe make out a top 5, but at least I can name my first 3 favourite:


Blood +ย ; there is also an action movie made after this anime: Blood: The last vampire

Vampire Hunter D

Of course, add to the above their sequels and so on.

What is your favourite place to discuss about these hobbies?

leaving Berlin – apartment to rent

Posted: August 29, 2013 in personal

As some of you already know by now, I have quit my job and will leave Berlin end of September. You’ll find me somewhere in Romania (unsure yet where exactly) in the near-future. Most certainly I will be online though ๐Ÿ™‚

This means there is a 1-room apartment in Berlin, available starting October. If you know somebody interested in renting it, please let me know. It has a nice bed, sheets, a washing machine and kitchen and bath furniture. Thanks!


Posted: August 28, 2013 in media-culture
Tags: ,

Hope is the thing with feathers
That perches in the soul,
And sings the tune–without the words,
And never stops at all,

And sweetest in the gale is heard;
And sore must be the storm
That could abash the little bird
That kept so many warm.

I’ve heard it in the chillest land,
And on the strangest sea;
Yet, never, in extremity,
It asked a crumb of me.

Again, the nice folks from SANS Institute tempt us geeky people with very nice courses.

The one that got me on my nerves just recently is held by Mister Stephen Sims, a senior instructor with SANS. Unfortunately, Mr. Sims had to “trim down” the Exploitation course a bit, because it was too advanced and not enough people were able to keep up with it. Figures! Even SANS needs money ๐Ÿ™‚

SEC760 Advanced Exploit Development

Downside: “only” USD 3,735

Upside: Hands-on study with Stephen Sims, writing exploits on Linux and Windows, in good old C/C++.

It’s always refreshing to hear him talk, even if just in a short webcast introducing the Exploitation course, about vtables, stack and heap allocation, or playing with IDA. Not to mention the demos.

If you scroll down in the SANS page of Stephen Sims, you get to theย Upcoming Courses Taught By Stephen Sims, which follows: one Online end September, then Sydney, Las Vegas, Brussels etc.

You know how much I love Anna Netrebko and Verdi‘s operas. Well, the best of the best is now online, full show:

La Traviata


Some time ago I was writing about how proud I am to see Romania as the leader in IPv6 adoption. We, Romanians, are majorly geeky when it comes to technology. Of course, that does not mean we get the security part always right, but, hey, no pain, no gain!

Also some time ago I started a quick look into the IPv6 security, more precisely the SeND feature. Unfortunately, things happened and I didn’t have time to continue the series.

Up until some time ago, when I looked more closely into what IPv6 security actually means. This is how I ended up purchasing the IPv6 Security book from Scott Hogg and Eric Vyncke. Hogg is the Director of Advanced Technology Services in GTRI, while Vyncke is a distinguished engineer at Cisco. The book is published by Cisco. The guy’s references have some weight, though by my stressful and painful experience with Cisco CCIE Security personnel kindly forcing me to use Aggressive Mode, while I wanted a Main Mode S2S and RA config on the same firewall some years ago, I would not credit Cisco with way too much when it comes to security. But this book is good.


Cristina gets bored very quickly.

Cristina is bored now.

What Cristina does when she gets bored… hrm… let’s see. I wanna build the best PRNG (pseudo-random number generator) function ever!

The first question is: what does it take a PRNG to make it “the best ever”. I had no idea. A bit of googling and bugging some specialised friends about it, I narrowed it down to 3 main things:

1. Statistical randomness


inside the ESP

Posted: August 24, 2013 in technical
Tags: , , , ,

Let’s go somewhere where the bad guy should never go ๐Ÿ˜›

As I am listening to Blind Guardian, I have such a taste to write some more about my dear IPSec. As many of my other IPSec-related posts, this one either couldn’t have been possible without the help of my colleague and IPSec guru, vmp.

The entire purpose of the fancy IKE (IKEv1, IKEv2) negotiation is to establish a secure tunnel between the 2 IPsec peers, in order to protect the traffic between the sensitive entities, which are:


This content is password protected. To view it please enter your password below:

This content is password protected. To view it please enter your password below: