Skip to main content

Posts

SSH

SSH (Secure Shell) is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are referred to as SSH1 or SSH-1 and SSH2 or SSH-2. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data. Read on by reading the PDF.  Title: Using & Configure SSH File Name: SSH.pdf File Type: PDF File Size: 1.23 MB Download Now

Keeping your software updated.

There is a software called " Secunia PSI ". Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus and are therefore increasingly popular among criminals. The only solution to block these kind of attacks is to apply security updates, commonly referred to as patches. Patches are offered free-of-charge by most software vendors, however, finding all these patches is a tedious and time consuming task. Secunia PSI automates this and alerts you when your programs and plug-ins require updating to stay secure.   Pro's Provides links to update programs Can be ran as background service   Free for personal use only Compares you to other users in the city/state Rates how updated the programs are Con's May not have all specific applications You can download beta version at ht...

Using GnuPG

GnuPG is a free software alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. GnuPG is a basic program that has a command line interface, there exist various front-ends that provide it with a graphical user interface. For example, GnuPG encryption support has been integrated into KMail and Evolution, the graphical e-mail clients found in the most popular Linux desktops KDE and GNOME. The cross-platform plugin Enigmail provides GnuPG support for Mozilla Thunderbird and SeaMonkey. Similarly, Enigform and FireGPG provide GnuPG support for Mozilla Firefox. “From Wikipedia”. To understand how PGP you can read about at http://en.wikipedia.org/wiki/Pretty_Good_Privacy .   GnuPG File Name: GnuPG.pdf File Type: PDF File Size: 2.36 MB Download Now

DTS Enterprise is back!!!

Get ready world that the new article/tutorials are going to be release tomorrow. Danny Tech Security was busy with reconstructing website at dtsenterprise.tech.officelive.com . Now that that site is almost fully functional here's a preview what type of new tutorials are coming in the next few weeks. GnuPG is the open source of PGP which means "Pretty Good Privacy" I can show more images of what is coming up in the next few week, but I don't to spoil anyone.

What is Metasploit?

The Metasploit is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development and a tool for developing and executing exploit code against a remote target machine. Metasplot can be installed in Microsoft Windows, Linux, or MAC OS X. Metasploit can check for the latest exploits on the web. Installation is simple for Microsoft Windows or Linux. As you see in the picture below. Read the PDF to get started. File Name: What is Metasploit.pdf File Type: PDF File Size: 991 KB Download Now

Webgoat

WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use SQL injection to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson. From http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat is a platform independent environment. It utilizes Apache Tomcat and the JAVA development environment. The only thing required from the user is Java which can be downloaded from http://java.sun.com/downloads/ . Webgoat allows the user to practice in a safe environment with in the user’s network and webgoat can be run in Windows Linux, or MAC OS X. First let’s download the latest copy of webgoat http://code.google.com/p/webgo...

Lack of formal end-user training program makes IT look bad

The Author: Toni Bowers talks about how some companies don’t see the value of proper end-user training. They’re willing to pay thousands of dollars for a new product that is supposed to improve productivity but aren’t willing to do the one thing that will help with that product’s adoption in the enterprise. A good end-user training strategy will make new software deployments more cost effective. It is good post to read on your down time. http://blogs.techrepublic.com.com/career/?p=2152&tag=main;banner