Tag Archive: FireWall

Snort 2.9.7.0

Open-Source IDS/IPS Download Snort

Permanent link to this article: http://www.darknessgate.com/2015/03/04/snort-2-9-7-0/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/23/crowbar/

Justniffer

Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all “intercepted” files from the HTTP traffic. It lets you interactively trace tcp traffic from a live network or from a previously saved capture file. Justniffer’s …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/07/justniffer/

Link

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme.
It is charged up with penetration testing tools and other useful applications for general purposes.

http://seanux.sea.sy/#download

Permanent link to this article: http://www.darknessgate.com/2014/11/02/seanux/

Cryptography and Cryptanalysis

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Permanent link to this article: http://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/

Cryptography

This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/30/cryptography/

Hot Topics in High-Performance Computing: Networking and Fault Tolerance

Topics: Hot Topics in High Performance Parallel Computing: Networks and Fault Tolerance. Large-scale computer systems such as Petascale or upcoming Exascale machines pose significant challenges on the system and software designers. In this course, we will address to very important topics in this design: HPC networking and Fault Tolerance. The network will soon be the …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/27/hot-topics-high-performance-computing-networking-fault-tolerance/

Cisco CCNA Video Lecture

Video Lectures, Video Courses, Science Animations, Lecture Notes, Online Test, Lecture Presentations. http://www.learnerstv.com/Free-Computer-Science-Video-lectures-ltv578-Page1.htm

Permanent link to this article: http://www.darknessgate.com/2014/09/26/cisco-ccna-video-lecture/

Online Audio and Video Lectures on Computer Networking

Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html

Permanent link to this article: http://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/

Introduction to Computer Networking

This course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: overview of  network architectures, applications (HTTP, FTP), network programming interfaces (e.g., sockets), transport (TCP, UDP), flow control, congestion control, IP, routing , IPv6, multicast, data link protocols, error-detection/correction, multiple …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/introduction-computer-networking/

Networks and Protocols

The course discusses computer network and network protocols in some depth in order to enable students to understand the core issues involved in network protocol design. The fundamental algorithms and principles are explained in the context of existing IEEE / Internet protocols in order to demonstrate how fundamental principles are applied in real-world protocols. This …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/networks-protocols/

Page 1 of 212