Tag: Internet Protocols

Sguil

Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis. The Sguil client is written in tcl/tk and can be run …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/03/06/sguil/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

The web-application vulnerability scanner

Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/02/12/web-application-vulnerability-scanner/

BackBox Linux

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/

Network and Computer Security

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/17/network-computer-security/

Emerging Security Vulnerabilities & the Impact to Business

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/13/emerging-security-vulnerabilities-impact-business/

Hot Topics in High-Performance Computing: Networking and Fault Tolerance

Topics: Hot Topics in High Performance Parallel Computing: Networks and Fault Tolerance. Large-scale computer systems such as Petascale or upcoming Exascale machines pose significant challenges on the system and software designers. In this course, we will address to very important topics in this design: HPC networking and Fault Tolerance. The network will soon be the …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/27/hot-topics-high-performance-computing-networking-fault-tolerance/

Data Communications and Computer Networks

Goals and Learning Outcomes The goal of this module is to: provide a good understanding of the electrical characteristics of digital signals and the basic methods of data transmission. introduce the concept of communication protocols and give an overview of Data Communication Standards. give an introduction to the area of computer networks, with emphasis on …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/26/data-communications-computer-networks/

Performance Issues in High Speed Networks

The purpose of this course is to introduce graduate students to networking research. The first part of the course (about 67%) provides an introduction to the Internet and the basic methodologies of computer systems performance evaluation, including a detailed discussion of Internet protocols and applications, wired and wireless networking technologies, and networking research paradigms. The …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/26/performance-issues-high-speed-networks/

Cisco CCNA Video Lecture

Video Lectures, Video Courses, Science Animations, Lecture Notes, Online Test, Lecture Presentations. http://www.learnerstv.com/Free-Computer-Science-Video-lectures-ltv578-Page1.htm

Permanent link to this article: https://www.darknessgate.com/2014/09/26/cisco-ccna-video-lecture/

Online Audio and Video Lectures on Computer Networking

Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html

Permanent link to this article: https://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/