Security

Facebook Twitter

Open source anti-theft solution for Mac, PCs & Phones – Prey

Silent but deadly Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it. Next Recover what is rightfully yours You can quickly find out where your computer is located, who's using it, and what they're doing on it thanks to Prey's powerful reports system. Open source anti-theft solution for Mac, PCs & Phones – Prey
Ugolog - Online video monitoring system
Firewall Builder Firewall Builder Does this sound familiar? You need to make a firewall update, but you are not sure of the exact command you need, so you: Search for documentation. Scour forums. Trawl through wikis.
Secgeeks - information security | tools | vulnerabilities | penetration testing | learning by sharing!!!
Swing traders are often very beneficial, but also high risk. It might last pertaining to as small as a couple of minutes to be able to as long as many days to weeks. To succeed at this method, investors should comprehend the challenges and the advantages of each one deal. SSH Tunnels - Linuxlogin.com SSH Tunnels - Linuxlogin.com
Packet Crafting for Firewall & IDS Audits (Part 2 of 2) Packet Crafting for Firewall & IDS Audits (Part 2 of 2) Introduction This is the second of a two-part article series that discusses various methods of testing the integrity of your firewall and IDS, using low-level TCP/IP packet crafting tools and techniques. Part one showed several examples that tested a firewall (port 80 TCP, and port 53, UDP) using tools like hping and tcpdump. We will now continue the discussion with a third test of the firewall, using the same tools as noted above, and then move on to test your IDS signatures and detection ability. Note that the focus here is on a Linux environment, but the process is similar with other Unix-like firewall/IDS environments as well.
Optimizing NIDS Performance Optimizing NIDS Performance Introduction Network intrusion detection systems (NIDSs) face some of the most gruelling challenges of any security product. Not only is the bandwidth these devices monitor increasing, so are the amount of attacks they must guard against.
Testing security with hping
Internet Security Guru
A guide to securing your home and home network with inexpensive hardware, open source software and about 8 hours of dedicated time. This is a living document, updated on a regular basis to reflect additional best practice methodologies, tips and tricks as they become available. In this guide, we will walk you through the process of building and configuring security systems to protect your home and home/office network through the use of motion-sensing digital security cameras, advanced firewalls, intrusion detection systems, and realtime notification mechanisms. In a mere eight hours, we will endeavor to build and configure a moderately sophisticated wired and wireless home or office LAN with a DMZ for public-facing services, strong ingress and egress filtering for all connected subnets and a realtime risk management console with live monitoring and alerts by email and/or telephone! Technorati Tags: howto, linux, privacy, security Armor Your Palace Armor Your Palace
Today we are going to take a quick look at dig. According to the man pages: dig (domain information groper) is a flexible tool for interrogating DNS name servers. KarKomaOnline - For SysAdmins KarKomaOnline - For SysAdmins
Intrusion detection and prevention learning guide More on intrusion detection and prevention Threats expert Nick Lewis explains how to prevent data exfiltration via covert channels SearchSecurity.com members gain immediate and unlimited access to breaking industry news, virus alerts, new hacker threats, highly focused security newsletters, and more -- all at no cost. Join me on SearchSecurity.com today! It's no secret that a layered security strategy is the key to protecting enterprise networks from malicious intrusions. Intrusion detection and prevention learning guide
Hacking Linux Exposed
Intrusion Detection FAQ - The Internet's most trusted site for vendor neutral intrusion detection information Secure Access / Login Intrusion Detection FAQ The Internet's most trusted site for vendor neutral intrusion detection information. Updated May 19, 2010 View Press Release Click here for Intrusion Detection In-Depth: The Most Advanced Intrusion Detection Immersion Training Available Intrusion Detection FAQ - The Internet's most trusted site for vendor neutral intrusion detection information