5 Linux Distros focused on computer security

5 Linux Distros focused on computer security

This article is based on a list found on http://www.hackingmexico.mx/. Today I’ll present you 5 Linux distribution focused on computer security, in this list I’ve not put 2 distro I’ve already talked about: Backtrack and Damn Vulnerable Linux. The 5 Linux distribution are: DEFT (Digital Evidence & Forensic Toolkit), QubesOs, Pentoo, Lightweight Portable Security and […]

OpenVAS - Open Source Vulnerability Scanner

OpenVAS – Open Source Vulnerability Scanner

I thank Maurizio Pagani for allowing me to publish and translate his interesting presentation, published on http://babel.it. OpenVAS is a framework that includes services and tools for scanning and the complete managment of vulnerability. A vulnerability scanner is a tool that allows you to scan a target system (IP/HOSTNAME) based on a range of ports […]

Protect Linux from cold boot attacks with TRESOR

Protect Linux from cold boot attacks with TRESOR

While reading an interesting Blog I discovered a new treasure: TRESOR, in short TRESOR is a secure implementation of AES which is resistant against cold boot attacks and other attacks on main memory. If like me you wonder what a cold boot attack is, Princeton University can help us : Contrary to popular assumption, DRAMs […]

Security first! Here’s how to make your Linux impenetrable.

Article by Giuseppe Sanna One of the most important things for eveybody is undoubtedly the security ! Sure, the software can be reinstalled, the hardware can be bought back … But your information? Those can not be re-installed or repurchased. In the event of a crash … you could lost all forever! For this reason, […]

Protect your server with SSHGuard

Protect your server with SSHGuard

I’ve already talked about fail2ban and logcheck, 2 tools that can scan your logs and do actions, based on rules that you can give/modify, usually modify your iptables rules to stop active attacks against your server or simply send you a warning if some thing is found in the logs. Today we’ll see a similar […]