background preloader

Tahoe-LAFS

Tahoe-LAFS

https://tahoe-lafs.org/trac/tahoe-lafs

Related:  Security

Most popular VMWare Virtual Appliances for IT Administrators Updated on September 23, 2009: Please review the updated list of virtual appliances. You may also be interested in reviewing virtual appliances for Security. The original post has been retained as a historical reference. The download links for most of the appliances in the following table no longer work since VMware has revamped the Appliance Marketplace. Thanks I have ranked the virtual appliances for IT Administrators available at the VMWare Virtual Appliance Marketplace (VVAM) as described below. IT Career Paths - A Guide to Credentials and Certifications If you love technology, then the IT field can offer a number of opportunities and areas to specialize in. As you hone in on your skills, you can validate your knowledge by advancing up the certification ladder to achieve new career heights. Whatever path you choose, we'll help you figure out the right steps to take.

Best Information Security Certifications for 2016 - Certs - Tom's IT Pro InfoSec professionals who want to set themselves apart as leaders in IT security should seriously consider one of these top five information security certifications for 2016. When it comes to information security, you need only read the headlines to observe that those with malicious intent constantly find new and scary ways to access and misuse privileged information for criminal, unscrupulous or questionable purposes. As a result, IT professionals skilled in information security remain in very high demand and should do so for the foreseeable future. When evaluating prospective InfoSec candidates, employers frequently look to certification as one measure of excellence and commitment to quality. In this article, we take a look at five InfoSec certifications we consider to be leaders in the field of information security today. If you're serious about advancing your career in the IT field and are interested in specializing in security, certification is a good bet.

EC-Council Certification Guide: Overview and Career Paths - Tom's IT Pro EC-Council offers some of the best-known ethical hacking and penetration testing certifications. This guide will help you get started with EC-Council's popular CEH and LPT credentials as well as other information security certs and career paths. The International Council of Electronic Commerce Consultants (EC-Council) is a professional organization headquartered in Albuquerque, New Mexico. The organization is known around the world as a leader in information security education, training and certification.

Creepy, the Geolocation Information Aggregator What is Creepy ? So what is Creepy actually and how does it come into the “Geolocation” picture ? Creepy is a geolocation information aggregation tool. Adversary Resistant Computing Platform: SubgraphOS Subgraph OS is an adversary resistant computing platform. The main purpose of Subgraph OS is to empower people to communicate, share, and collaborate without fear of surveillance and interference. What this means in practical terms is that users of Subgraph OS can safely perform their day-to-day tasks securely and privately.

Rogue Wi-Fi Access Point: 3vilTwinAttacker CyberPunk » Information Gathering This tool create an rogue Wi-Fi access point , purporting to provide wireless Internet services, but snooping on the traffic 3vilTwinAttacker is security tool that provide the Rogue access point to Man-In-The-Middle and network attacks. purporting to provide wireless Internet services, but snooping on the traffic. can be used to capture of credentials of unsuspecting users by either snooping the communication by phishing. Dependencies: Python-scapyPython-nmapBeautifulSoupAirbase-ng include in aircrack-ngDHCP-server

System Hardening Guide Run Apache as separate User and Group Apache runs its process with a default user account and group. For many security reasons, it is recommended to run Apache with its own non-privileged account. groupadd webuser useradd -d /var/www/ -g webuser -s /bin/nologin webuser Make sure Apache knows this setting by editing the etc/apache2/envvars. vi etc/apache2/envvars Automate Security Audit: Netool.sh Netool is a toolkit written in bash, python and ruby and provides easy automation for frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap – mostly MitM attacks. This toolkit makes tasks as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters very easy and gives you the ability to capture pictures of target webbrowser surfing (driftnet). It also uses macchanger to decoy scans by changing the mac address. Rootsector: module allows you to automate some attacks over DNS_SPOOF + MitM (phishing – social engineering) using metasploit, apache2 and ettercap frameworks. like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. Example: inurlbr.php -q 1,2,10 --dork 'inurl:index.php?id=' --exploit-get ?

Network Security Toolkit - NST Network Security Toolkit (NST) is a bootable ISO image (Live DVD) based on Fedora providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the Top 125 Security Tools by INSECURE.ORG are available in the toolkit.

Related: