public marks

PUBLIC MARKS with tags documentation & security

2018

📛 HACK - VIDEO - Applied Hacking channel - Samy Kamkar - YouTube

by decembre
SITE: https://samy.pl/ Applied Hacking channel. I'm releasing original research, tools and videos around hacking, technology and security - typically around reverse engineering, coding, software, hardware, radio, electronics, fabrication and physical security (as in physical lock picking, not as in flying karate chops). Full source code, schematics, 3D models, and documentation will often be provided, and I'll go step by step into many of these projects so you can follow along, and build even better things! If I don't forget, I'll also explain how to protect yourself from such attacks and methods to improve security.

2008

Nimbus

by camel
Nimbus provides a free, open source infrastructure for remote deployment and management of virtual machines, allowing you to: * Create compute clouds (make your own EC2 style service). For examples, see the science clouds page. * Deploy "one-click" auto-configuring virtual clusters (see the cloud clusters page). They adapt on the fly into new network and security contexts so you can set them up once and run them over and over again, even across different clouds. * Serve clients that are compatible with the Amazon EC2 service, see What is the EC2 frontend? * Integrate VMs on a set of resources already configured to manage jobs (i.e., already using a batch scheduler like PBS). See What is the Workspace Pilot? * Interface to Amazon EC2 resources, see What is the EC2 backend? * Easily experiment with new remote protocols and backends, see What is the RM API?

Integrating amavisd-new Into Postfix For Spam- And Virus-Scanning

by lecyborg & 1 other
This article shows how to integrate amavisd-new into a Postfix mail server for spam- and virus-scanning. amavisd-new is a high-performance interface between MTAs such as Postfix and content checkers: virus scanners, and/or SpamAssassin. We will use ClamAV for virus scanning and SpamAssassin for spam scanning in this tutorial. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

2007

Data Encryption

by lecyborg
Gestion du cryptage des données avec Bacula.

Howto crack (or hack) a wireless network with Wired Equivalent Privacy (WEP)

by lecyborg
WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping

How to Install Openvpn

by lecyborg
The purpose of this document is to describe how to install OpenVPN server on an Ubuntu Linux system and have it utilize an Ethernet bridge to access your local network. Ethernet bridges essentially allow the operating system to treat multiple network interfaces as one combined port. When used with OpenVPN a bridge will allow you to easily connect external users to your internal network and have them receive all traffic as though they were locally connected. The alternative is to use OpenVPN with a route but that will not allow some forms of traffic through (such as multicast), multicast traffic is important to me as many games require multicast data.

Firewall et sécurisation d'un réseau personnel sous Linux

by lecyborg & 1 other
Ce document a pour but d'expliquer les rudiments de la sécurité d'une machine Linux placée dans un réseau local (typiquement une maison on un appartement), reliée à Internet. Il est tout particulièrement destiné aux utilisateurs néophytes, ou n'ayant pas ou peu de connaissance sur la sécurité informatique en général, et sous Linux en particulier.

Squid content filtering

by lecyborg
Bloquer et interdire l'accès a certains fichiers avec Squid, le proxy. Ici exemple pour la musique et les vidéos.

Configuring PuTTY

by lecyborg & 1 other
Un bon tutorial sur la configuration du client ssh Putty

Damn Vulnerable Linux

by lecyborg
Distribution dédiée à l'apprentissage de la sécurité

Tor: Guide d'installation pour Linux/BSD/Unix

by lecyborg & 1 other
Ces instructions ne s'appliquent qu'à l'installation d'un client Tor

truecrypt

by lecyborg
Cryptage de fichiers et de partitions avec Truecrypt

2006

PUBLIC TAGS related to tag documentation

#mouarf +   ajax +   backup +   blogs +   books +   code +   computer +   computing +   database +   design +   development +   downloads +   ebooks +   education +   free +   freeware +   ftp +   grid +   hack +   hacking +   howtos +   html +   internet +   java +   linux +   network +   opensource +   perl +   personal +   php +   programming +   reference +   resources +   ressource +   rss +   security +   serveur +   software +   ssh +   technology +   tips +   tools +   tutorial +   tutorials +   ubuntu +   usability +   utilities +   webdesign +   windows +   xml +  

Active users

decembre
last mark : 29/05/2020 12:10

camel
last mark : 26/09/2008 15:18

lecyborg
last mark : 21/01/2008 09:56

zoom2au
last mark : 16/06/2006 01:10

trash
last mark : 09/02/2006 11:50