background preloader

ModSecurity: Open Source Web Application Firewall

ModSecurity: Open Source Web Application Firewall

Related:  Security Training

Certified Information Security Consultant (CISC) 6 Months, Training, Course, Certification - Institute of Information Security, Mumbai(India) CISC is 6 months training in information security for amateurs and professionals to make you an expert in the field of Information Security. The course is ideal for those wanting to differentiate themselves from candidates with an undergraduate degree only, as well as those already in industry wishing to advance their skills in this constantly evolving area. Many companies are actively recruiting security specialists and this course will prepare graduates for senior technical and management positions in many industry sectors.

Ping Tutorial: 15 Effective Ping Command Examples As you already know, ping command is used to find out whether the peer host/gateway is reachable. If you are thinking ping is such a simple command and why do I need 15 examples, you should read the rest of the article. Ping command provides lot more options than what you might already know. Ping Example 1.

15 Penetration Testing Tools That Every Pen-Tester Can Use! 1) Metasploit This penetration testing framework is very popular amongst hackers and penetration testers all over the world. It is based on the 'exploit' concept, which refers to a code that can break past a system's security measures. 2) Wireshark

How To Block Facebook's Face Recognition And Tighten Other Privacy Settings Facebook seems to be forever pushing the boundaries of what "online privacy" means. Today we see the latest iteration of this--Face Recognition. By adjusting its interface, Facebook has now enabled "tag suggestions" to many more of its users around the world, which means your friends will get an alert if someone uploads a photo that Facebook thinks contains your image. wall m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ease of use) at a fraction of the price (free software). m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format. In m0n0wall 1.8.1, the base system has been switched to FreeBSD 8.4 for better support of recent hardware, and there have been significant improvements, new features and bug fixes in many areas.

RawCap sniffer for Windows released ! ~ THN : The Hacker News RawCap sniffer for Windows released We are today proude to announce the release of RawCap, which is a free raw sockets sniffer for Windows. Here are some highlights of why RawCap is a great tool to have in your toolset:Can sniff any interface that has got an IP address, including (localhost/loopback)RawCap.exe is just 17 kBNo external libraries or DLL's neededNo installation required, just download RawCap.exe and sniffCan sniff most interface types, including WiFi and PPP interfacesMinimal memory and CPU loadReliable and simple to useUsage RawCap takes two arguments; the first argument is the IP address or interface number to sniff from, the second is the path/file to write the captured packets to. C:\Tools>RawCap.exe dumpfile.pcap You can also start RawCap without any arguments, which will leave you with an interactive dialog where you can select NIC and filename: RawCap Downloaded

Research Labs Cost: FreeSource Code: GitHubVersion: (XMAS edition)Requirements: .Net FrameworkLicense: GPLRelease Date: 2008-12-14Recent Changes:Fixed incorrect links spider bugAdded time anomaly functionality in back-end scanner.Added easy access (and icons) to findings in back-end scanner.Fixed executable finding occasionally not showing bug. Wikto is Nikto for Windows - but with a couple of fancy extra features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.

Want To Learn Wi-Fi Hacking? Here Are 10 Good Websites For You! 1.WildPackets WildPackets Inc, founded in 1990, develops hardware and software solutions that drive network performance, enabling organisations of all sizes to analyse, troubleshoot, optimise, and secure their wired and wireless networks. 2.Wireshark Wireshark is the world's foremost network protocol analyser. Network Monitoring Tools Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. Annotated.js For large, complex Javascript applications or libraries, Annotated.js provides a language extension for expressing the structure & validity of your code. By annotating your regular Javascript code, the Annotated.js runtime provides additional language features like declarative namespaces, class and module macros, and runtime type testing. Runs directly in the browser, even in external sources - what you see in the IDE is what you get in your browser's debug session. Annotated.js is legal javascript and runs natively in the browser without eval, code rewriting or server-side compilation - it's also fully compatible with popular minifiers, parallel or AJAX-y script loaders, code optimiziers, etc.

HTTP Headers for Dummies Whether you're a programmer or not, you have seen it everywhere on the web. At this moment your browsers address bar shows something that starts with " Even your first Hello World script sent HTTP headers without you realizing it. In this article we are going to learn about the basics of HTTP headers and how we can use them in our web applications. What are HTTP Headers? HTTP stands for "Hypertext Transfer Protocol".

Here Are 200+ Tutorial Videos On Cryptography! 1. CISSP Training - Cryptography Description: This video on Cryptography is part of our CISSP certification Training Series. Zuckers! Facebook Has Secretly Been Giving User Info to Cops - Technology We've told you before that Facebook treats its users like products. That companies now exist to search for your Facebook account and tell your bosses your secrets. That people are quitting Facebook en masse. Now, there's yet another reason you might want to make the switch to Google+: Facebook has gotten into the habit of allowing police to scour users' profiles without their consent. According to a new report from Reuters and Westlaw, federal judges have granted at least 24 search warrants since 2008 allowing law enforcement officials to snoop around people's Facebook accounts. Some of the warrants sought things as innocuous as status updates, but others gave access to friend requests, photos, event calendars and personal messages.

List of HTTP status codes This is a list of Hypertext Transfer Protocol (HTTP) response status codes. It includes codes from IETF internet standards, other IETF RFCs, other specifications, and some additional commonly used codes. The first digit of the status code specifies one of five classes of response; an HTTP client must recognise these five classes at a minimum. The phrases used are the standard wordings, but any human-readable alternative can be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard (RFC 7231).[1] The Internet Assigned Numbers Authority (IANA) maintains the official registry of HTTP status codes.[2]