Virtualbox Guest Additions with screen resizing

Over the years I keep coming back to this problem, but it seems the answer changes slightly, so here is an updated version of getting VirtualBox’s guest additions working including, the bits for screen resizing. This is for Debian-based linux VMs:

sudo apt update
sudo apt install virtualbox-guest-dkms virtualbox-guest-utils virtualbox-guest-x11

If the above doesn’t instantly work for you, you may also need to install:

sudo apt install linux-source linux-headers-generic

Reboot, and fingers-cross, it should work! If it doesn’t, and you installed things before you installed virtualbox-guest-x11, you will also need to run:

sudo dpkg-reconfigure virtualbox-guest-dkms

Custom adhesive-backed laser cut privacy screens for laptops

Years ago I bought privacy screens for the company I was working for at the time. I really hated them, mostly, because I couldn’t stand the dirt and grime that constantly collected behind them, and the unsightly attachment mechanisms and the fact that they kept falling off my laptop every time I closed the screen. Eventually I found a company that was willing to take a custom order for privacy screens and better still, they were self-adhesive which meant they couldn’t fall off, there was no ugly attachments and they couldn’t get dirt stuck behind them. I tried to find these guys again recently and really struggled – I kept finding garden screens and other random products on Amazon. After searching for a while I found the company again and now they even have an online shop. SO I don’t loose the link again, here they are:

Conference Talk – B-Sides London 2018

Earlier this year, I was honoured to be accepted to speak at Security B-Sides London 2018 on the Rookie track. I presented the research I completed for my Masters degree in the use of Unencrypted WiFi networks by business users. They recorded the session and it is now available on YouTube:

My work builds on top of known attacks and existing software to attempt to establish whether or not it is possible to extract NetNTLM hashes from computers connected to unencrypted WiFi networks.

Slide Deck “How to: Actually attack computers at cafes”