Tag: checksum

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/23/crowbar/

Alpine Linux

Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/17/alpine-linux/

BackBox Linux

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/

SEANux

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme. It is charged up with penetration testing tools and other useful applications for general purposes. http://seanux.sea.sy/#download

Permanent link to this article: https://www.darknessgate.com/2014/11/02/seanux/

Cryptography and Cryptanalysis

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Permanent link to this article: https://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/

Cryptography from Fachbereich Informatik

This lecture deals with the following cryptographic topics: Cryptographic Foundations (security goals, historical ciphers, AES, a sketch of RSA) Foundations of information theory (terms, probability theory, Shannon’s theorem) Entropy Design principles of cryptographic hash functions Pseudo random number generators and stream ciphers A sketch of elliptic curve cryptography Quantum cryptography Implementation issues (efficiency, obfuscation) https://www.fbi.h-da.de/organisation/personen/baier-harald/teaching/lectures-summer-term-2012/cryptography.html  

Permanent link to this article: https://www.darknessgate.com/2014/09/25/cryptography-fachbereich-informatik/

Cryptography and Protocols – Spring 2014

http://www.cs.sfu.ca/CourseCentral/404/abulatov/

Permanent link to this article: https://www.darknessgate.com/2014/09/20/cryptography-protocols-spring-2014/

Introduction to Modern Cryptography 2012

Cryptography has a very long and exciting history. For centuries, political leaders and military forces have used cryptographic techniques, primarily to communicate securely. Modern cryptography is concerned with an enormous variety of scenarios where the involved parties do not fully trust each other such as internet banking, electronic voting, integrity of data, security of computer …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/18/introduction-modern-cryptography-2012/

Online Audio and Video Lectures on Computer Networking

Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html

Permanent link to this article: https://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

Course F21CN: Computer Network Security

The purpose of Course F21CN Computer Network Security is to provide a solid understanding of the main issues related to security in modern networked computer systems. This covers underlying concepts and foundations of computer security, basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to secure complex systems and practical skills in managing a …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/07/course-f21cn-computer-network-security/