What Is HoneyPot Server?
TL;DR This time we present an excellent blog post Learn from your attackers – SSH HoneyPot by Robert Putt. HoneyPot is a deliberately vulnerable system. But not vulnerable as not…
TL;DR This time we present an excellent blog post Learn from your attackers – SSH HoneyPot by Robert Putt. HoneyPot is a deliberately vulnerable system. But not vulnerable as not…
Passwords Evolved: Authentication Guidance for the Modern Era by Troy Hunt [source] How to do modern password authentication. Pathway Exploratory Testing by Marcel Gehlen [source] I adore this post. Collection…
AWS Security Primer by Michael Wittig source] AWS security features in one mind map! A Curated List Of Startup Tools by [source] If you work in a startup or you…
PostgreSQL Monitoring Cheatsheet by Russ Garrett [source] This is an attempt to build a fairly comprehensive list of metrics you should be monitoring on a PostgreSQL 9.4 database server….
Insecure by default, hijacking websites that use target “_blank” by @chriscct7 [source] The best way to learn about Web Application Security is, by example. Click on two links on this…
SELinux Coloring Book by Dan Walsh and Mairin Duffy [source] SELinux stands for Security-Enhanced Linux and it is a Linux security kernel module. Linux box without SELinux is not secure….
Show HN: A Curated List For Application Security by P.I.E Security Team [source] Software security is hard because this is a very wide topic. Here you have an awesome application…
PSA: Beware of sudo on OS X by Ron [source] Ron describes the OS X sudo issue that is not present in my current OS X 10.13.6 because of this…
10 Books on Thinking About Thinking by Barry Ritholtz [source] Barry gives a list of books that think about how we think. Bach and Bolton [source] started their testing…
Rule of three (computer programming) [source] I like three heuristics. Rule of three (“Three strikes and you refactor”) is a code refactoring rule of thumb to decide when similar pieces…