Jump to content

Rocco

Active Members
  • Posts

    6
  • Joined

  • Last visited

Recent Profile Visitors

663 profile views

Rocco's Achievements

Newbie

Newbie (1/14)

  1. People who are are starting out with Linux and Computer Security. It is suppose to give them a brief introduction to different concepts. Forensics, OSINT, Cryptography, etc.
  2. At the moment, there is no content in the book, other than the table of contents. So I am not condensing 500+ pages of Perl into 1 page. As I add more content it was span more pages obviously. I just posted the Table of Contents to give you an idea of what will be in it.
  3. Hello everyone! I am writing a book about Linux and some other stuff. Below is the table of contents so far. If you would like to see anything, let me know. What should I add, what should I remove? What would you like to see? What topics should I cover? The purpose of the book is to be a brief introduction to Linux and Computer Security concepts. Preface 3 1. Key Concepts 5 1.1 Knowing Your System 5 1.1.1 Streams 5 1.1.2 Types of Files 5 1.1.3 File System Tree 5 1.1.5 Inode Tables 7 1.1.6 Magic Numbers 7 1.1.4 Time Stamps 7 2. The Command Line 9 2.1 BASH 9 2.1.1 Types of BASH Programs 9 2.2.2 Special Characters in BASH 9 2.2.3 Determining a Program Type 9 2.2.4 BASH Tricks 10 2.2 RPM 10 2.3 Yum 10 2.4 Screen 10 2.5 Xargs 10 2.6 Regular Expressions 10 2.7 Perl 10 2.8 Find 10 3. System Installations 11 3.1 System Backups 11 3.2 System Setups 11 3.3 Virtual Machines 11 4. Networking 12 4.1 SSH 12 4.2 Rsync 12 4.3 IP-Tables and Firewalld 12 4.4 TCPDump 12 4.5 Netstat and Netcat 12 4.6 Ports/Sockets 12 4.7 OpenVPN 12 4.8 DHCP 12 5. Hacking – Basic 13 5.1 Basic Cryptography 13 5.2 System Fingerprinting 13 5.3 Signs of Malicious Activity 13 5.4 System Vulnerabilities 13 6. Hacking – Advanced 14 6.1 Advanced Cryptography (Theory) 14 6.2 Understanding TOR and Configuring TOR 14 6.3 Forensics and Anti-Forensics 14 6.4 Google Search “Hacking” 14 7. Military Systems and Conventions 15 7.1 International Alphabet 15 7.2 Military Time Zones 15 Definitions 16 Resources 19
  4. Thank you very much Cooper and Digi-Ninja. I will take your advice and look at your blogpost about your BSidesLondon Talk. I will also do some more research.
  5. Hello. I am very interested in getting into Computer Security. It is a very interesting field, but from what I have seen it isn't that easy to get into. Most jobs require 5+ years of work experience before hand. Also I have been told that I should get some sort of IT Security Certifications. So, If I am just starting out, and have no job experience in the field. How would you recommend I get into Computer Security? What certifications would you suggest I should get? What courses should I take? How should I get involved, etc?
  6. For all you non-believers out there (digininja), I would just like to point out, in case you haven't taken the time to look at the full paper closely enough, that one of the co-authors of the paper is "Adi Shamir", who is a co-creator of the RSA Algorithm ®ivest (S)hamir (A)dleman. So I would highly doubt that the co-creator of the RSA ALGORITHM would be lying about an attack or bad implementation of the RSA ALGORITHM. But then again, I might be wrong, who knows ;)
×
×
  • Create New...