Tag Archive: Command Line Tool

CNIT 121: Computer Forensics

The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Upon successful completion of this course, the student will be …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/06/cnit-121-computer-forensics/

CSE571S: Network Security (Fall 2011)

A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/04/cse571s-network-security-fall-2011/

Applied Cryptography

Have you wondered how one might define security — even for a cryptographic concept as simple and familiar as encryption? What makes public-key cryptography possible? (Well, what is public-key cryptography?) What is MD5 and what’s wrong with it? What is homomorphic encryption? What are zero-knowledge proofs (and are they for real)? What magical tools can …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/01/applied-cryptography/

Fundamentals of Integrated Computer Security

Network security, database and system security, access control, policy and ethics development, attacks, and counter attack measures, security tools and malicious code, current trends and research. The objective of this course is to cover principles of computer and network security along with some relevant background in basic cryptography. We will discuss various attack techniques and …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/08/31/fundamentals-integrated-computer-security/

Box Backup

Box Backup is an open source, completely automatic, on-line backup system. It has the following key features: All backed up data is stored on the server in files on a filesystem – no tape, archive or other special devices are required. The server is trusted only to make files available when they are required – …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/22/box-backup/

BackupPC

BackupPC is a high-performance, enterprise-grade system for backing up Linux, WinXX and MacOSX PCs and laptops to a server’s disk. BackupPC is highly configurable and easy to install and maintain. BackupPC Features A clever pooling scheme minimizes disk storage and disk I/O. Identical files across multiple backups of the same or different PCs are stored …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/21/backuppc/

Unison

Unison is a file-synchronization tool for Unix and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating the changes in each replica to the other. Unison shares a number …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/20/unison/

Burp

Burp is a network backup and restore program. It uses librsync in order to save network traffic and to save on the amount of space that is used by each backup. It also uses VSS (Volume Shadow Copy Service) to make snapshots when backing up Windows computers. It is open source free software (where ‘free’ …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/17/burp/

Areca Backup

Areca Backup is an Open Source personal backup solution which is released under the General Public License (GPL) v2. Backup Engine Features : Archives compression (Zip & Zip64 format) Archives encryption (AES128 & AES256 encryption algorithms) Storage on local hard drive, network drive, USB key, FTP, FTPs (with implicit and explicit SSL / TLS) or …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/14/areca-backup/

Xymon systems and network monitor

Xymon is a system for monitoring of hosts and networks, inspired by the Big Brother system. It provides real-time monitoring, an easy web-interface, historical data, availability reports and performance graphs. Xymon monitors your hosts, your network services, and anything else you configure it to do via extensions. Xymon can periodically generate requests to network services …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/09/xymon-systems-and-network-monitor/

Clonezilla

Clonezilla is a partition and disk imaging/cloning program similar to True Image® or Norton Ghost®. It helps you to do system deployment, bare metal backup and recovery. Two types of Clonezilla are available, Clonezilla live and Clonezilla SE (server edition). Clonezilla live is suitable for single machine backup and restore. While Clonezilla SE is for …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/03/18/clonezilla/

Page 4 of 6« First...23456