Keystore management in Linux

Keystore management in Linux

Many Java application server use a keystore as a repository of their certificates and in general all Java applications use the one supplied with the JDK itself, Let’s see what is it and how to work with it. A keystore is a repository of security certificates, that can hold your keys and certificates and encrypt […]

Introduction to snort

Introduction to snort

Installing and using SNORT on Ubuntu Author: Mike Walton Snort is a very powerful IDS that in later versions can act like an IPS. Snort is free to download and use in the personal enviornment as was as in the business environment. In fact Snort is used by many Enterprises as a very effective option for […]

Cryptography and digital sign with GnuPG 2

Cryptography and digital sign with GnuPG 2

Original article by Maurizio Antonelli In the previous article we presented some basic concepts of encryption and made some examples of symmetrical and asymmetrical keys, we concluded by saying that a good way to get a certificate with an asymmetric key  is GnuPG. GnuPG is open-source and multiplatform. It uses native command line in a […]

Nmap the port scanner

Nmap the port scanner

Last article of my series on tools for network analysis, after wireshark, ntop and a fine assortment of tools to use with the command line is the time to see nmap. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find […]