Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis. The Sguil client is written in tcl/tk and can be run …
Tag: Internet Protocols
Permanent link to this article: https://www.darknessgate.com/2015/03/06/sguil/
Medusa Parallel Network Login Auditor
Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …
Permanent link to this article: https://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/
The web-application vulnerability scanner
Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, …
Permanent link to this article: https://www.darknessgate.com/2015/02/12/web-application-vulnerability-scanner/
BackBox Linux
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …
Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/
Network and Computer Security
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …
Permanent link to this article: https://www.darknessgate.com/2014/10/17/network-computer-security/
Emerging Security Vulnerabilities & the Impact to Business
This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL …
Permanent link to this article: https://www.darknessgate.com/2014/10/13/emerging-security-vulnerabilities-impact-business/
Hot Topics in High-Performance Computing: Networking and Fault Tolerance
Topics: Hot Topics in High Performance Parallel Computing: Networks and Fault Tolerance. Large-scale computer systems such as Petascale or upcoming Exascale machines pose significant challenges on the system and software designers. In this course, we will address to very important topics in this design: HPC networking and Fault Tolerance. The network will soon be the …
Permanent link to this article: https://www.darknessgate.com/2014/09/27/hot-topics-high-performance-computing-networking-fault-tolerance/
Data Communications and Computer Networks
Goals and Learning Outcomes The goal of this module is to: provide a good understanding of the electrical characteristics of digital signals and the basic methods of data transmission. introduce the concept of communication protocols and give an overview of Data Communication Standards. give an introduction to the area of computer networks, with emphasis on …
Permanent link to this article: https://www.darknessgate.com/2014/09/26/data-communications-computer-networks/
Performance Issues in High Speed Networks
The purpose of this course is to introduce graduate students to networking research. The first part of the course (about 67%) provides an introduction to the Internet and the basic methodologies of computer systems performance evaluation, including a detailed discussion of Internet protocols and applications, wired and wireless networking technologies, and networking research paradigms. The …
Permanent link to this article: https://www.darknessgate.com/2014/09/26/performance-issues-high-speed-networks/
Cisco CCNA Video Lecture
Video Lectures, Video Courses, Science Animations, Lecture Notes, Online Test, Lecture Presentations. http://www.learnerstv.com/Free-Computer-Science-Video-lectures-ltv578-Page1.htm
Permanent link to this article: https://www.darknessgate.com/2014/09/26/cisco-ccna-video-lecture/
Online Audio and Video Lectures on Computer Networking
Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html
Permanent link to this article: https://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/