background preloader

DEFT Linux - Computer Forensics live CD

DEFT Linux - Computer Forensics live CD
Hello Everybody, First of all, Happy New Year. It has been a very tough year, full of surprises, some positive, some others not. One of these, the premature death of my father, forced us to stop temporarily the development of DEFT 8.1 causing a delay in its release date. In this regard, the board of directors of DEFT Linux Association recently met to plan a new road-map in view of DEFTCON 2014. DEFT 8.1 will be released no later than the first week of April 2014, thus to be able to present the latest news at DEFTCON; the same day DEFT Zero, a micro live CD for forensic acquisition only, will be released.

http://www.deftlinux.net/

Related:  Tools: Security - Forensics - Pentesting - Ethical HackingDistributions dédiées à la protection de la vie privéeOpSecozdzamir

Autopsy Forensic Easy to Use Autopsy was designed to be intuitive out of the box. Installation is easy and wizards guide you through every step. All results are found in a single tree. Hack From A Cave - Katana Katana: Portable Multi-Boot Security Suite Last Updated: 11/10/2010 Links Description IO Ninja Scriptable/Programmable The word "programmable" speaks for itself. Now you can turn IO Ninja into your personal IO debugger and tune it to your liking with Jancy scripting. Whether you need a non-standard protocol analyzer, a network device emulator or an IO testing utility, IO Ninja can be programmed to do the job. We also provide an IO Ninja IDE (Integrated Development Environment) to assist you in exploring and making use of scripting in IO Ninja. OWASP Developer Guide. OWASP Developer Guide The OWASP Developer Guide 2014 is a dramatic re-write of one of OWASP's first and most downloaded projects. The focus moves from countermeasures and weaknesses to secure software engineering. Introduction

KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-) System Requirements: Pentium III compatible processor, 10MB free space on the hard drive. CD-ROM, Floppy Drive or USB flash drive, keyboard, Internet connection (for product download). Compatible BIOS version.Windows system is required for installer to run. USB flash drive is required for the EFI version to work. BleachBit Portable cache, temp file and history cleaner BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and delete temporary files.

Software Protection Initiative - Lightweight Portable Security 15 June 2011: LPS-Remote Access was certified by AFNIC to connect to the GIG for general telecommuting use Lightweight Portable Security (LPS) creates a secure end node from trusted media on almost any Intel-based computer (PC or Mac). LPS boots a thin Linux operating system from a CD or USB flash stick without mounting a local hard drive. Security Onion Our easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes Analyze and visualize your NIDS/HIDS alerts with Squert Pivot between multiple data types with Sguil and send pcaps to Wireshark and NetworkMiner

The Best Linux Distros On this page you will find the best Linux distros for various purposes. We've taken the effort to categorize them and picked only those we believe to be the best ones and which will most likely be useful to you. One of the most popular general-use distributions with one of the largest selections of software. Based on: Debian The most cutting-edge general-use distribution on a 6-month release cycle. It's cutting edge in two ways: new versions of software, and it uses new software before other distributions use them.

Top 15 Open Source. Free Security. Tools. 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing.

Related: