background preloader


Facebook Twitter

That One Privacy Guy's VPN Comparison Chart. Understanding and selecting authentication methods. If you are serious about computer/network security, then you must have a solid understanding of authentication methods.

Understanding and selecting authentication methods

Security LLC - Chargen - If You're Typing The Letters A-E-S Into Y. Understudy note In tonight’s performance (January 2015) and onward, the role of MIKE TRACY will be played by JEFF JARMOC. A “young, cool-people’s” coffee shop on the first floor of an old office building in downtown Chicago. “My band is playing” notices line the wall. Why are free proxies free? Node.js Security Tips. Customizing OpenStack RBAC policies. OpenStack uses a role based access control (RBAC) mechanism to manage accesses to its resources.

Customizing OpenStack RBAC policies

With the current architecture, users' roles granted on each project and domain are stored into Keystone, and can be updated through Keystone's API. However, policy enforcement (actually allowing or not the access to resources according to a user's roles) is performed independently in each service, based on the rules defined in each policy.json file. In a default OpenStack setup (like Devstack), two roles are created: The Member role, which when granted to a user on a project, allows him to manage resources (instances, volumes, ...) in this project.The admin role, which when granted to a user on any project, offers to this user a total control over the whole OpenStack platform.

Although this is the current behavior, it has been marked as a bug. Attributes available to build custom policies Four types of attributes can be used to set policy rules: Example: admin and super_admin Notes. I was just asked to crack a program in a job interview ! I was just asked to crack a program in a job interview. and got the job.

I was just asked to crack a program in a job interview !

Hello everyone, i am quite excited about my new blog here.I am planning to write couple of blog posts every week. Since the title gives you a brief information about general concept , i would like to tell you my story about a job interview that was held in Ankara,TR. I applied a position named as "Software Security Engineer" and In the interview , they asked me really low level stuff some of them i know , some of them i dont. Then they send me an email which includes an attachment for a protected and encrypted binary. When i got home , i downloaded it and it asked me only a password to unlock it.They wanted me to find that password :) At first , it looks pretty hard but i will try to introduce the general concept that i had followed :) Here is the first thing i typed in the terminal root@lisa:~# .

Recommended Reading. This page lists books that I have found to be highly relevant and useful for learning topics within computer security, digital forensics, incident response, malware analysis, and reverse engineering.

Recommended Reading

These books range from introductory texts to advanced research works. While some of these books may seem dated, the information contained is still very useful to people learning today, and much of the information is essential to becoming proficient in the information security realm. Please note that, in order to avoid ranking individual books, each category is listed in alphabetical order and each book is listed in alphabetical order within its category.

If you notice any errors with this page or have books that you think should be listed then please contact me. WebSockets – Varnish, Nginx, and Node.js. This post was published 2 years ago.

WebSockets – Varnish, Nginx, and Node.js

Due to the rapidly evolving world of technology, some concepts may no longer be applicable. Like many others I have been drawn in by the appeal of websockets and their use in (near) real-time communication. As such one of my current projects uses Node.js and websockets (via To maximize compatibility, I would, of course, like my Node.js site to run on port 80. My server, however, is not used exclusively for this project – it also has traditional PHP/MySQL sites running on it.

My current setup has Varnish as a caching layer – to cache the dynamic PHP scripts – and Nginx as a webserver. As is good practice, static content will be served from a separate subdomain, but I would like all remaining content (including the websockets) to be served from the main domain. To recap, the objectives are: Информационный портал по безопасности XSS Filter Evasion Cheat Sheet.

Last revision (mm/dd/yy): 06/1/2016 This cheat sheet is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter evasion.

XSS Filter Evasion Cheat Sheet

Please note that most of these cross site scripting vectors have been tested in the browsers listed at the bottom of the scripts. XSS Locator Inject this string, and in most cases where a script is vulnerable with no special XSS vector requirements the word "XSS" will pop up. Cross-site Scripting (XSS) This is an Attack.

Cross-site Scripting (XSS)

To view all attacks, please see the Attack Category page. Underground InformatioN Center - Компьютерная безопасность. Packet Storm. SecurityFocus. Computer Security - Internet Security - Network Security - Anti Virus Information Portal - Anti Virus Hacking Alerts Bulletins - InfoSysSec. BugTraq.Ru.