(IN)Secure Magazine (issue 44 december 2014)

Contents The covered topics are: The five stages of security grief Infosec industry: Time to put up or shut up Review: Secure file storage and sharing with nCrypted Cloud Prioritizing penetration testing Report: McAfee FOCUS 14 Managing the security of applications in private and hybrid cloud infrastructures Vigilance and the Enterprise of Things Seven Destiny video game tactics that translate to cyber security Review: ESET Smart Security 8 Maltego transforms for pcap an...
More

(in)secure magazine issue#42

Contents Six infosec tips I learned from Game of Thrones Dissecting the newly-discovered desire for control and privacy Incident response and failure of the "Just Fix It" attitude How to learn information security Who are you? The impact of security breaches on authentication Thecus N5550 NAS Server inside and out Report: Hack In The Box Amsterdam 2014 Ensuring the integrity of Rostelecom’s Wi-Fi network What inspired you to start hacking? Beyond Heartbleed: Closing SSL imp...
More

(Cheatsheet) Linux Security

Cheatsheet Linux Security Quick Reference Guide - An awesome security checklist reference The intent of this Quick Reference Guide is to provide a starting point for improving the security of your system, to serve as a pointer to more in-depth security information, and to increase security awareness and methods that can be used to improve security. It is not a substitute for reading any of the vast amounts of Linux security documentation that already exists.In the ever-changing world of glob...
More

Linux Security for Beginners

Description: There is a saying in the security world that the only truly safe computer system is one that is disconnected from the network, switched off and buried six feet under ground. The sentiment may be somewhat true but it is hardly a practical solution to the problems we face today in protecting servers and desktops from outside intrusion. There are more computer systems connected to the internet either directly or via local area networks than at any time in the history of technol...
More

(in)secure Issue 43 (September 2014)

  Contents     What is the value of professional certification?     How to tell if your security system has been fingerprinted by evasive malware     Mobile hackers look to the network     Why every security-conscious organization needs a honeypot     Securing the U.S. electrical grid     Using Hollywood to improve your security program     How a large ISP fights DDoS attacks with a custom solution     Black Hat USA 2014     The synergy of hackers and tools at the Bla...
More

Linux Administrator’s Security Guide

Year: 2001 Description: I wrote this book originally because no Linux security documentation existed back in the late 1990's. Since then several Linux security books have been published, but in general they all have shortcomings (for example one of them spends 40 pages on cops, a largely obsolete tool). So anyways I've decided it's time to update the book, which is one major advantage of doing this on the www. Currently it is April 2001, I'm hoping the major rewrite will be done by fall or w...
More

Linux Firewall Configuration: Packet Filtering and Netfilter/iptables

Year: 2006 Description: This document was written purely so people can start to grasp the wonderful world of iptables. It was never meant to contain information on specific security bugs in iptables or Netfilter. If you find peculiar bugs or behaviors in iptables or any of the subcomponents, you should contact the Netfilter mailing lists and tell them about the problem and they can tell you if this is a real bug or if it has already been fixed. There are very rarely actual security related bug...
More

Securing Debian Manual

Year:2000-2013 Description: This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team. Contents: 1 Introd...
More

Open Source Security Tools: A Practical Guide to Security Applications

Year: 2005 Pages:600 Description: Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solu...
More

OWASP testing guide 4.0

Description: The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues. Contents: Frontispiece Introduction The OWASP Testing Framework Web Application Security Testing Configuration and Deployment Management Testing Identity Management Testing Authentication Test...
More