background preloader

Russgouveia

Facebook Twitter

Russ Gouveia

Turkey: Protest culture flowers at Istanbul's Taksim Square.

Sample for Kristi

Netcat (Ncat and nc as well) Rosetta Stone for Unix. Footnotes 1. In System V-based Unixes, run level relates to booting, shutdown, and single-user mode. In BSD, it has to do with security. 2. Freeware or separately downloadable; not part of the base OS. See the precompiled binaries task or web search. 3. 4. ioscan -funC disk may be helpful here to determine device path. 5. Universal Command Guide is a large book which covers several of the OSs in this table. UnixGuide.net has a similar table covering fewer Unix versions and a somewhat different set of tasks. Colin Barschel's Unix Toolbox cb.vu/unixtoolbox.xhtml is a wonderfully detailed handbook sorted by task area and giving both commands and config file excerpts for Linux and BSD. coolcommands is a search engine giving one-line command examples: www.coolcommands.com/index.php?

Solaris / HP-UX / FreeBSD / Linux / AIX: www.unixporting.com/quickguide.html Solaris / HP-UX: soldc.sun.com/migration/hpux/migissues/. Unix / DOS: yolinux.com/TUTORIALS/unix_for_dos_users.html USENIX: www.usenix.org/ Google Hacking Database, GHDB, Google Dorks. Dark Reading | Security | Protect The Business - Enable Access. HoneyMap. Sicherheitstacho.eu.

Exploit_Categories_Explained.pdf. DaveAitel_TheHackerStrategy.pdf. Rosetta Stone for Unix. IT Security News and Security Product Reviews. The good, bad and ugly November 01, 2012 While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems. 10 steps toward eliminating insider threats September 27, 2012 If there's one threat in information security that's difficult to prevent, it's the insider threat. But there are ways in which your organization can minimize the risks.

Centrify for Best Customer Service September 07, 2012 When it comes to customer service in the industry, Centrify believes they're the best, and hope to prove it with a win at the SC Awards. Axway for Best Email Security Solution Phishing is at an all time high, but Axway believes its email security solution is the answer. Researchers consider threat of car hacking By Danielle WalkerAugust 24, 2012 It's not necessarily new, but researchers are upping their work into discovering weaknesses in on-board automobile computers, which conceivably could allow an hacker to do harm.

Infosecurity - the online magazine dedicated to the strategy and technique of information security.