background preloader

SECURITY

Facebook Twitter

Top 100 Network Security Tools. Educational. 6 Ways to Keep Your Search Secrets Safe. It’s sad to say but many recent events (Google Search Subpoena, AOL’s BIG Mistake, etc) make it very clear that online your privates are not private anymore.

6 Ways to Keep Your Search Secrets Safe

I mean, do you really want people to know your secret love of fairies? Or worse? As disturbing, funny, and nutty some of those searches are one thing is pretty clear — people ran them in private. Or thought they did anyway. More disturbing is that the entire web is now reading about them, blogging them, doing news stories on them. Luckily, you can go a long way to keeping your secret searches safe. Lost In The Crowd This site allows you to search your favorite engines while automatically mixing your searches with a large number of other searches essentially creating “search noise”.

Hopefully these tools will help you improve your level of privacy online. Did I miss any good tools? Scan IP Addresses for Malicious Activity - IPVoid.com BETA. Network Tools by YouGetSignal.com. The Best Hacking Tutorial Sites - Learn Legal Hacking - StumbleUpon. Opencall - Open Source Call Tracking Software. IT Security. Defensible network architecture. For the nearly 20 years since Zwicky, Cooper and Chapman first wrote about Firewalls the firewall has been the primary defense mechanism of nearly every entity attached to the Internet.

Defensible network architecture

While perimeter protection is still important in the modern enterprise, the fact is that the nature of Internet business has vastly changed and the crunchy perimeter and squishy inside approach has long since become outdated. You can’t deny what you must permit and the primary attack vectors today appear to be email and browser exploits; two aspects of your business model that you cannot do without and which can give the bad guys a foothold inside your perimeter protections.

As the Sony, Target, Home Depot, and many other breaches have shown, once the bad guys are into the network they are content to dig in, explore, and exfiltrate large amounts of data and will often go undetected for months. Top 10 Password Crackers. SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools.

Top 10 Password Crackers

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU. Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data.

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU

The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data. This acoustic cryptanalysis, carried out by Daniel Genkin, Adi Shamir (who co-invented RSA), and Eran Tromer, uses what’s known as a side channel attack.

A side channel is an attack vector that is non-direct and unconventional, and thus hasn’t been properly secured. For example, your pass code prevents me from directly attacking your phone — but if I could work out your pass code by looking at the greasy smudges on your screen, that would be a side channel attack. Attack Tool Kit (Windows) How to surf anonymously without a trace. Skip to comments.

How to surf anonymously without a trace

How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. Top 15 Open Source/Free Security/Hacking Tools.

1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. The Ethical Hacker Network. Can password-protected zip files be broken without brute force?

80+ Best Free Hacking Tutorials. Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker.

You must have a passion and positive attitude towards problem solving. Top 15 Open Source/Free Security/Hacking Tools.