Search
Results
A Visual Guide to SSH Tunnels (with labs)
decalage2/awesome-security-hardening: A collection of awesome security hardening guides, tools and other resources
the_cyber_plumbers_handbook/cph_version_1.4_20210829.pdf at master · opsdisk/the_cyber_plumbers_handbook · GitHub
[https://github.com/opsdisk/the_cyber_plumbers_handbook/blob/master/cph_version_1.4_20210829.pdf] - - public:xxx
Linux Hardening Guide | Madaidan's Insecurities
Fail2ban howto increased ban for repeat offenders
Shellshock BASH Vulnerability Tester
SecurityDistro - Security Distributions
Notes for using GPG to encrypt and decrypt backup files
Linux: How to Encrypt and decrypt files with a password
[http://www.cyberciti.biz/tips/linux-how-to-encrypt-and-decrypt-files-with-a-password.html] - - public:xxx
Encrypting and decrypting files with GnuPG | TechRepublic
[http://www.techrepublic.com/blog/opensource/encrypting-and-decrypting-files-with-gnupg/168] - - public:xxx
Setting up OpenSSL to Create Certificates | Flat Mountain
Damn Vulnerable Linux - The most vulnerable and exploitable operating system ever!
LinuxDevCenter.com -- How Shellcodes Work
[http://www.linuxdevcenter.com/pub/a/linux/2006/05/18/how-shellcodes-work.html?page=1] - - public:speqz
Make CD-ROM Recovery (mkCDrec)
[http://mkcdrec.ota.be/] - - public:megatux
, the backups can be stored on another local disk, NFS disk or (remote) tape. After a disaster (disk crash or system intrusion) the system can be booted from the CD-ROM and one can restore the complete system as it was (at the time
Mondo Rescue - GPL disaster recovery solution
LUKS - Linux Unified Key Setup
Snort - the de facto standard for intrusion detection/prevention
Knoppix STD: Tools
Endian Firewall
Nikto - sniffer for valunerabilities
The Ethical Hacker Network - Essential Wireless Hacking Tools
IP-spoofing Demystified
Class based linux Kernel Resource Management
Detecting Kernel Rootkits
Linux iptables HOWTO
Safely delete Linux files with libtrash: Builder AU: Program: UNIX
Hardened cross compiling for Linux, NetBSD and FreeBSD
Proxy ARP with Linux
SE Linux Policy Development Course
Secure Remote Logging with syslog-ng and stunnel
Sealing the kernel
Using FreeS/WAN with Windows L2TP/IPsec
Jedi/Sector One's blog
IPSEC: secure IP over the Internet with Linux 2.6.x
Shell Intrusion Detection
Linux Kernel Security
Flyn Computing Project Listing
Sandbox System Call API for Linux
kernsh
Secure Programming for Linux and Unix HOWTO
WLSec - Wireless LAN Security Framework
Bugghy's pages
pam_chroot
[http://sourceforge.net/projects/pam-chroot/] - - public:zhesto
pam_chroot is a Linux PAM module that allows a user to be chrooted in auth, account, or session.