Search
Results
A Visual Guide to SSH Tunnels (with labs)
SSHGuard
decalage2/awesome-security-hardening: A collection of awesome security hardening guides, tools and other resources
the_cyber_plumbers_handbook/cph_version_1.4_20210829.pdf at master · opsdisk/the_cyber_plumbers_handbook · GitHub
[https://github.com/opsdisk/the_cyber_plumbers_handbook/blob/master/cph_version_1.4_20210829.pdf] - - public:xxx
Linux Hardening Guide | Madaidan's Insecurities
How to install and use Firejail on Linux - TechRepublic
ferm - for Easy Rule Making
Fail2ban howto increased ban for repeat offenders
Dd - Destroyer of Disks - Noah.org
Shellshock BASH Vulnerability Tester
SecurityDistro - Security Distributions
LEAF — Linux Embedded Appliance Firewall
tinc wiki
Lynis
Kali Linux
Home
[http://qubes-os.org/Home.html] - - public:mepage
Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers.
KeePassX
Web Filtering On Squid Proxy | HowtoForge - Linux Howtos and Tutorials
Notes for using GPG to encrypt and decrypt backup files
Linux: How to Encrypt and decrypt files with a password
[http://www.cyberciti.biz/tips/linux-how-to-encrypt-and-decrypt-files-with-a-password.html] - - public:xxx
Encrypting and decrypting files with GnuPG | TechRepublic
[http://www.techrepublic.com/blog/opensource/encrypting-and-decrypting-files-with-gnupg/168] - - public:xxx
Setting up OpenSSL to Create Certificates | Flat Mountain
Unhide homepage - Welcome
Tarsnap - Online backups for the truly paranoid
Home | BackBox Linux
Damn Vulnerable Linux - The most vulnerable and exploitable operating system ever!
LinuxDevCenter.com -- How Shellcodes Work
[http://www.linuxdevcenter.com/pub/a/linux/2006/05/18/how-shellcodes-work.html?page=1] - - public:speqz
Make CD-ROM Recovery (mkCDrec)
[http://mkcdrec.ota.be/] - - public:megatux
, the backups can be stored on another local disk, NFS disk or (remote) tape. After a disaster (disk crash or system intrusion) the system can be booted from the CD-ROM and one can restore the complete system as it was (at the time