Lockbin is a web application for sending private email messages and files. It’s free! People use it to send things like credit card numbers or confidential information. Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. https://lockbin.com/
Tag: Security learning
Permanent link to this article: https://www.darknessgate.com/2016/09/15/lockbin/
Framework for Improving Critical Infrastructure Cybersecurity
The Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
Permanent link to this article: https://www.darknessgate.com/2016/09/04/framework-for-improving-critical-infrastructure-cybersecurity/
StartPage
StartPage by Ixquick (www.ixquick.com) combines the powerful search results of Google with the strong privacy features of Ixquick, the world’s most private search engine. The result is great search results – with total privacy protection! No IP addresses are stored, no personal data is gathered or passed on to third parties, and no identifying cookies …
Permanent link to this article: https://www.darknessgate.com/2016/09/01/startpage/
sslstrip
This tool provides a demonstration of the HTTPS stripping attacks that I presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which …
Permanent link to this article: https://www.darknessgate.com/2015/03/15/sslstrip/
Aircrack-ng
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng …
Permanent link to this article: https://www.darknessgate.com/2015/02/12/aircrack-ng-3/
Magnet RAM Capture
Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a suspect’s computer, allowing investigators to recover and analyze valuable artifacts that are often only found in memory. Magnet RAM Capture has a small memory footprint, meaning investigators can run the tool while minimizing the data that is overwritten in …
Permanent link to this article: https://www.darknessgate.com/2015/02/12/magnet-ram-capture/
Alpine Linux
Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …
Permanent link to this article: https://www.darknessgate.com/2014/11/17/alpine-linux/
Permanent link to this article: https://www.darknessgate.com/2014/11/06/exiv2/
Network and Computer Security
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …
Permanent link to this article: https://www.darknessgate.com/2014/10/17/network-computer-security/
Introduction to computer forensics and investigations
Learning outcomes an understanding of the role of computer forensics in both the business and private world identify some of the current techniques and tools for forensic examinations describe and identify basic principles of good professional practice for a forensic computing practitioner become familiar with some forensic tools and know how to apply them in …
Permanent link to this article: https://www.darknessgate.com/2014/10/13/introduction-computer-forensics-investigations/
Emerging Security Vulnerabilities & the Impact to Business
This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL …
Permanent link to this article: https://www.darknessgate.com/2014/10/13/emerging-security-vulnerabilities-impact-business/