grinful + security   110

I read the Meltdown paper so you don't have to
Meltdown is a cache-timing attack on Intel CPUs that allows all memory to be read by any process because of how they do Speculative Execution.
programming  security  article  meltdown 
january 2018 by grinful
Basics of Making a Rootkit: From syscall to hook! – D0hnuts
WARNING: This tutorial is for educational purposes only, and by NO MEANS should you actually be malicious when (or after) making a rootkit. I thought I'd share how to do this for any security minded people who would like to learn more on how to prevent or look for rootkits. This will be done in C on Linux,…
kernel  security  hacking  rootkit  tutorial 
december 2016 by grinful
Analyse your HTTP response headers
Quickly and easily assess the security of your HTTP response headers
http  security  network  tool  headers  ssl 
october 2016 by grinful
Shipping an App with App Transport Security - don't panic
In iOS 9 and OS X 10.11, Apple introduced App Transport Security (ATS), a
low-level set of restrictions on apps’ network connections. One of …
security  ssl  network  ios  ats  tls 
september 2016 by grinful
My First 10 Minutes On a Server - Primer for Securing Ubuntu
A primer into securing a server against most attacks -- a more verbose extension and adaptation of My First 5 Minutes on a Server by Bryan Kennedy.
linux  security  server  sysadmin  devops  howto  best-practices 
june 2016 by grinful
Free SSL/TLS Certificates with Let's Encrypt and NGINX
Learn how to integrate the free SSL/TLS certificates from Let's Encrypt into your NGINX and NGINX Plus environment, and renew them automatically.
nginx  security  ssl  https  letsencrypt  renew 
february 2016 by grinful
SSH tunnelling for fun and profit: Autossh
SSH tunnelling for fun and profit: AutoSSH. Automatically restart SSH sessions and tunnels with AutoSSH and use systemd to launch SSH tunnels at boot time.
cli  ssh  admin  tunnel  networking  security 
january 2016 by grinful
Secure Your React and Redux App with JWT Authentication
Learn how to add JWT authentication to your React and Redux app. Use Redux middleware to make secure calls to an API.
reactjs  redux  jwt  authentication  security 
january 2016 by grinful
My First 5 Minutes On A Server; Or, Essential Security for Linux Servers
Server security doesn’t need to be complicated. My security philosophy is simple: adopt principles that will protect you from the most frequent attack vectors, while keeping administration efficient enough that you won’t develop “security cruft”.... | Bryan Kennedy | Ideate, Innovate, Launch
linux  security  config  sysadmin  admin  unix  setup 
december 2015 by grinful
Linux/Apache/MySQL support and web development
Linux consultancy, system administration and support from Linuxbox.co.uk
ebook  linux  security  networking 
may 2015 by grinful
gorhill/uBlock
uBlock - µBlock - An efficient blocker for Chromium and Firefox. Fast and lean.
adblock  chrome  firefox  security  ads  privacy  github 
january 2015 by grinful
Secure Secure Shell
You attempted to reach stribika.github.io, but instead you actually reached a server identifying itself as a shape shifter humanoid reptile alien. This may be caused by a misconfiguration on the server or something more serious. An attacker on your network could be trying to get you to visit a fake (and definitely harmful) version of stribika.github.io. You should not proceed.
config  crypto  security  ssh  hardening  linux  cryptography 
january 2015 by grinful
Keyczar
Keyczar: An open source cryptographic toolkit
google  cryptography  java  security  encryption  crypto 
december 2014 by grinful
I was just asked to crack a program in a job interview !
Personal blog of Eren, about computers, math and music
c  hacking  security  cracking  gdb  linux 
september 2014 by grinful
casperstorm/Bob
Bob - Tarsnap OS X GUI client
backup  client  osx  tarsnap  security 
may 2014 by grinful
Secure Coding Guide: Introduction to Secure Coding Guide
Describes techniques to use and factors to consider to make your code more secure from attack.
security  securityhacking  coding  codingstandards  osx  ios 
february 2014 by grinful
« earlier      
per page:    204080120160

related tags

acl  adblock  admin  ads  analysis  androguard  android  antivirus  apktool  article  aslr  asm  asp.net  assembly  ats  attack  authentication  backup  best-practices  bestpractices  blog  book  books  bug  c  camera  career  cas  certificate  certificates  chrome  cli  client  code  coding  codingstandards  complexity  config  configuration  cookies  cracking  crypto  cryptography  cyber-security  database  dataProtection  deauth  debug  debugging  decompiler  decrypt  development  devops  diskencryption  dns  Dropcam  ebook  education  encryption  entropy  eventReceiver  evercookie  exploit  firefox  flash  fxcop  gdb  github  golang  google  googleIO  guide  hack  hacking  hardening  hash  headers  howto  http  https  iis  infosec  integritylevel  ios  iphone  jailbreak  java  javascript  jquery  jwt  kernel  keychain  keyCzar  keystore  learning  letsencrypt  linux  list  malware  map  meltdown  mitm  netsec  network  networking  nginx  objc  objective-c  opensource  osx  password  passwordstrength  pawned  pentest  pentesting  permissions  pinning  pki  privacy  programming  proxy  ptrace  rails  reactjs  reddit  redux  reference  renew  research  resources  reverse-engineering  reverse_engineering  rootkit  router  s3  salting  security  securityhacking  server  settings  setup  soft-skill  software  sps  ssh  ssl  startup  sysadmin  tarsnap  tls  tool  tools  training  travel  tunnel  tutorial  ubuntu  unix  via:zite  vista  vpn  web  webbed  webdev  webRTC  wf  wifi  x86_64  xss 

Copy this bookmark:



description:


tags: