How to learn tips and tricks - Page 13

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Learn Tips And Tricks HOWTOs

PHP Shell, for secure remote access when SSH isn't available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SSH is one form of secure, remote access. And most of the time, it's one of the most popular ways to control your server from afar. But in the event that you don't have that option (rare as it may be), you may want to consider PHP Shell. You might wonder about the security of setting up a PHP script that allows shell commands to be executed, but PHP Shell is no more or less secure an application than any other PHP file on the server. Of course, you must be responsible for your own security.

Encrypting CD/DVD's in Ubuntu

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ever wanted to secure your DVD collection? How about protecting you data-packed CDs? This is a quick and concise HOWTO on getting your circular media encrypted from possible attacker. It takes you through getting the necessary tools, and will work on any distro, even though it use Ubuntu.

Bastille Linux: Introduction and installation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The popular Linux security guru, James Turnbull, has everything you need to know on getting Bastille up and running. Hardening your Linux hosts doesn't have to be a difficult process, if you can use an automated security tool like Bastille Linux. Bastille covers a wide variety of platforms and distributions, making it ideal for configuring heterogeneous IT environments. In this tip, I'll describe the way Bastille Linux works and explain how to get started.

OWASP Introduction to Using JbroFuzzer In Labrat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Welcome to the LabRat-JBroFuzzer introduction tutorial. In this tutorial we will review the basic uses for JBroFuzzer and how to start it in the LabRat live security distribution. This is an entry level tutorial that requires the user to know how to run a live ISO in VMware. If you are an advanced user and looking for programming resources to add to JBroFuzzer please check the OWASP JBroFuzzer page or Sourceforge. Read More

Anti Forensics: Making Your Computer Protected

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This paper presents a wealth of information, ranging from basic, all the way to advanced techniques used in defeating forensic analysis from affecting your network. Why is this important? Because as the tools for protection become more sophisticated, so do the tools for unwanted analysis, and forensics is one of the most growing aspects in security. This is a solid overview and serve as a great resource to find out what forensics is, what it does, where it's going, and what you can do to stop it.

OWASP Introduction to XSS using WebGoat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cross Site Scripting is one of the most common web vulnerabilities in existence today, and subsequently one of the most exploited issues. This tutorial is geared towards someone who may have heard of cross site scripting, and may even understand the concepts behind it, but would benefit by seeing real examples and having the opportunity to experiment with them. Read More

WebScarab

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the fundamental security vulnerabilities that exist among many of the popular flavors of exploits such as XSS and SQL Injection, as well as many others, is the lack of input validation. Web applications that check...

Installing Fedora 3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For the Linux novice, installing a new build can be a daunting task. This chapter will help you figure out what you need and what you don't. Even Linux pros will find some tips on configuring a build that can help enhance security.

OWASP Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Guide forms the basis for corporate web security policies for several Fortune 500 companies and is used in service offerings from many security consulting companies.

SQL Injection Attacks by Example

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation.

CISSP Open Study Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CISSP Open Study Guide web site is a site dedicated to helping CISSP (certified information system security professionnals) student in their quest to become certified.

Are You Ready for Sarbanes-Oxley Compliance?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Guardian Digital's "Achieving Compliance" white paper will serve as a resource to explain the mandates of Sarbanes-Oxley as it pertains to information technology and to further explain how Guardian Digital, the premier Internet and network security c

The Honeynet Project

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The honeynet project is a group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned. The team collects this information on their own time with their own resources