This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your network.
Free Books under Networks
This project is based on my original contribution to Beautiful Security. In Beautiful Trade: Rethinking Ecommerce Security, I laid out a design for card not present security and the prevention of credit card theft for online merchants and service providers.
I would like to open up this proposed design to the larger community via the commons wiki. The goal of the project is to design an electronic payment system that:
- Is secure by design, without reliance on additional controls outside the payment system
- Does not require major additions to current systems of payment processors or merchants
- Does not require major additions to clients or mass deployments of new software or hardware
- Is easy for consumers to use
The World Economic Forum started a research project at Davos 2009 concerning cloud computing, which they broadly define to include all kinds of remote services, from Software as a Service to virtual machines.
Andy Oram was asked to provide some ideas on the implications of cloud computing for business as well as its future operating environment. This wiki is a discussion forum where anyone with relevant and valid ideas can suggest points for ongoing research into the social and economic issues (as well as relevant technical issues).
Cloud computing is a huge topic, of course, spawning whole fields of study (as well as a lot of hype). This wiki tries to focus on long-term social and economic effects, especially on a global basis.
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.
This page aims to distinguish different arguments and reasoning in the debate around network neutrality, or control over traffic transmission on digital networks. The page was created to disentangle the many arguments, because the people arguing for and against network neutrality use multiple definitions of the term and mix together many arguments on different levels. The purpose of this page is not to air polemics, but to elucidate the various points made for and against various forms of network neutrality.
The document treats network neutrality as a business practice, and therefore does not cover related topics such as copyright enforcement, censorship, the move of processing and data to remote servers (often called "into the cloud"), policies of mobile providers toward content and applictions, or surveillance. Essentially, the document covers a public issue that started as a set of economic concerns and has been invested by debaters with social policy concerns.