background preloader

Software Protection Initiative - Lightweight Portable Security

Software Protection Initiative - Lightweight Portable Security
15 June 2011: LPS-Remote Access was certified by AFNIC to connect to the GIG for general telecommuting use Lightweight Portable Security (LPS) creates a secure end node from trusted media on almost any Intel-based computer (PC or Mac). LPS boots a thin Linux operating system from a CD or USB flash stick without mounting a local hard drive. Administrator privileges are not required; nothing is installed. The LPS family was created to address particular use cases: LPS-Public is a safer, general-purpose solution for using web-based applications. The accredited LPS-Remote Access is only for accessing your organization's private network. LPS-Public allows general web browsing and connecting to remote networks. LPS differs from traditional operating systems in that it isn't continually patched. To get started, download an LPS-Public ISO image or LPS-Public Deluxe ISO image and burn it to a CD. Download the LPS-Public ISO image, version 1.5.6 (5 December 2014). Read the LPS-Public Datasheet.

Related:  Distributions dédiées à la protection de la vie privée

Hack From A Cave - Katana Katana: Portable Multi-Boot Security Suite Last Updated: 11/10/2010 Links Description Katana Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. Downloads BackTrack 5 comes in several flavours and architectures. The following page will help you choose the right version for you. Although registration is not required, we would certainly appreciate it – and it would also give us the opportunity to update you when there are important BackTrack updates or news. BackTrack 5 is OUTDATED and no longer supported – Downloads have been discontinued . Please check the KALI LINUX project instead.

research - The ASP.NET Vulnerability - POET attack - BEAST SSL/TLS attack Practical Padding Oracle Attacks This paper discusses how cryptography is misused in the security design of a large part of the Web. Our focus is on ASP.NET, the web application framework developed by Microsoft that powers 25% of all Internet web sites. We show that attackers can abuse multiple cryptographic design flaws to compromise ASP.NET web applications. We describe practical and highly efficient attacks that allow attackers to steal cryptographic secret keys and forge authentication tokens to access sensitive information.

KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-) System Requirements: Pentium III compatible processor, 10MB free space on the hard drive. CD-ROM, Floppy Drive or USB flash drive, keyboard, Internet connection (for product download). Compatible BIOS version.Windows system is required for installer to run. USB flash drive is required for the EFI version to work. Disk encryption is not supported. Tablets are not supported. Boot Multiple ISO from USB (MultiBoot USB) YUMI UEFI Changelog 01/19/17 Version Fix to replace empty spaces in Distro filename with dashes. Update Get Drives function to ignore system and network drives. Correct some wording. 08/19/16 Version Add support for Arch Bang, Skywave Linux, and Cyborg Linux.

Ultra High Security Password Generator If some device was not following the WiFi Alliance WPA specification by not hashing the entire printable ASCII character set correctly, it would end up with a different 256-bit hash result than devices that correctly obeyed the specification. It would then be unable to connect to any network that uses the full range of printable ASCII characters. Since we have heard unconfirmed anecdotal reports of such non-compliant WPA devices (and since you might have one), this page also offers "junior" WPA password strings using only the "easy" ASCII characters which even any non-fully-specification-compliant device would have to be able to properly handle. If you find that using the full random ASCII character set within your WPA-PSK protected WiFi network causes one of your devices to be unable to connect to your WPA protected access point, you can downgrade your WPA network to "easy ASCII" by using one of these easy keys. And don't worry for a moment about using an easy ASCII key.

Subgraph OS and Mail Subgraph believes that the best way to empower people to communicate and live freely is to develop technology that is secure, free, open-source, and verifiably trustworthy. Subgraph OS is an important part of that vision. The Internet is a hostile environment, and recent revelations have made it more apparent than ever before that risk to every day users extends beyond the need to secure the network transport - the endpoint is also at risk. Subgraph OS was designed from the ground-up to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks. Subgraph OS is designed to be difficult to attack.

Blog Just one week left of the MediaGoblin campaign! Next Friday, the 18th of April, will be the last day of the campaign. There’s also never been clearer reason for why we need MediaGoblin (and the whole intersections of free culture and free software at that!) to succeed. How to Secure Your Apache Web Server How to Secure Your Apache Web Server Installing and maintaining a secure web server on Linux can be a challenge. It requires in-depth knowledge of Linux, Apache, and PHP server-side options. One of the main problems is to find the balance between security and productivity and usability. The best solution depends on the specific project requirements, but all installations share certain common characteristics.

Live Hacking Linux DVD Live Hacking DVD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live DVD” runs directly from the DVD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders. As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities. The Live Hacking DVD is designed for ethical computer hacking, meaning that it contains the tools and utilities you need to test and hack your own network but using the tools and techniques that more malicious hackers would use.

LogSurfer - Real Time Log Monitoring and Alerting LogSurfer Software and Resources Contents Introduction Logsurfer recent features Download Documentation Configuration examples Links Introduction InstallationGuide – Qubes Hardware Requirements ¶ Please see the Hardware Compatibility List page for more information on required and recommended hardware. Note: We don't recommend installing Qubes in a virtual machine! It will likely not work. Don't send emails asking about it. Download installer ISO ¶

Software Protection Initiative - Lightweight Portable Security by sirchamallow Jul 26