background preloader

Welcome to

Welcome to

Related:  Security ToolsnetxmsSecurity Training

Autopsy Forensic Browser: Download Download There are six files to download for each release: autopsy-X.X.X-32bit.msi: A 32-bit Windows installer. autopsy-X.X.X-64bit.msi: A 64-bit Windows installer. A platform for developers to write modules against. Various .asc files that are GPG signatures of the above files. To use Autopsy on windows, download an msi and run it. sans titre Captures network traffic, calculates statistics about usage, and serves reports over HTTP. Features: Traffic graphs, reports per host, shows ports for each host. Embedded web-server with deflate compression.

Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews.

HashDig 1 Welcome To The HashDig Project HashDig technology is a collection of utilities designed to help practitioners automate the process of resolving MD5 and SHA1 hashes. In the early stages of an investigation, it is not typically possible or practical to examine all subject files. MySQL Change root Password How do I change MySQL root password under Linux, FreeBSD, OpenBSD and UNIX-like like operating system over the ssh session? Setting up MySQL password is one of the essential tasks. By default, root user is MySQL admin account user. Please note that the Linux or UNIX root account for your operating system and MySQL root user accounts are different. They are separate, and nothing to do with each other. Sometime you may remove Mysql root account and setup admin user as super user for security purpose.

MRTG - Tobi Oetiker's MRTG - The Multi Router Traffic Grapher What it does You have a router, you want to know what it does all day long? Then MRTG is for you. It will monitor SNMP network devices and draw pretty pictures showing how much traffic has passed through each interface. Firesheep - Wikipedia, the free encyclopedia - StumbleUpon The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

Macintosh Security Site -> Mac OS X Firewalk - Firewall Configur Firewalk X - Mac OS XFirewall Configuration Utility Firewalk X 2 is out now - download @ bottom of page! What is Firewalk? Firewalk is a Mac OS X configuration utility for the built in firewall. While you are running Mac OS X you should be aware that you are running on a BSD/Mach kernal. NetXMS — Download Latest version is 2.0.2, released on January 29, 2016. Changelog is available here. Debian packages

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. [the new p0f] Copyright (C) 2012 by Michal Zalewski <> Yeah, it's back! 1. What's this? Netxms 1.2.1 on debian 6 : netxmsd -d don't start! Thank you, the problem is fixed!But now i have a new problem (XD)... When i try to login trough console i get the error "Connection refuse: connect"...But username and password are correct.. Here is my /etc/netxmsd.conf file:## Sample configuration file for NetXMS server# # DBDriver = /usr/local/lib/ Database driver to use## UNIX example:# DBDriver = [path_to_netxms_install_dir]/lib/ Windows example:# DBDriver = mysql.ddr

20+ Free VPN Tools for Anonymous Internet Surfing or Browsing Free VPN tools protect your online identity by securing all web transactions that you do while shopping, filling out forms, and downloads through HTTPS protocol and thus making your identity invisible to third party websites and ISP’s. These anonymous browsing tools keep you anonymous for your entire web session and protect your passwords, credit card numbers, from hackers or network snoopers. Below is a list of 20 tools that creates a virtual private network (VPN) between your laptop or iPhone and Internet gateway. The impenetrable tunnel created by VPN tools prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network.

Transferring your iTunes Library For most users, iTunes does a great job of handling all of the details of managing your media library for you, allowing you to manage your content through iTunes itself and not having to worry too much about the underlying files and folders that make up your iTunes library. Unfortunately, this user-friendly approach has one serious limitation: When it comes time to move your iTunes library, it can often be a bit of a challenge to figure out exactly what pieces you need to move and how to go about doing this. Many iTunes users start out with a basic iTunes library and use the default settings to store all of their media content on their primary internal hard drive. However, as you add new content over time, particularly with the additional video content now supported by iTunes, you may soon find that your library threatens to take over your computer. Another common scenario many users find themselves in is what to do when they upgrade to a new computer. How iTunes Manages Media Content