security

NEWS

Modern SSH Security: Best Practices

In a presentation given to the South Carolina Linux User Groups, Quoin's CTO Jean Pierre LeJacq shares best practices for modern SSH security. First released in 1999, OpenSSH is the open-source version of the Secure Shell (SSH) tools often used by Linux administrators for cross-platform management of remote systems. The ...

Read more

In a presentation given to the South Carolina Linux User Groups, Quoin's CTO Jean Pierre LeJacq shares best practices for modern SSH security. First released in 1999, OpenSSH is the open-source version of the Secure Shell (SSH) tools often used by Linux administrators for cross-platform management of remote systems. The presentation covers the topics most relevant for enterprises wishing to set up a SSH securely, such as common vulnerabilities and guidelines for avoiding them. Jean ...

Read more


Introduction to GDPR

Our digital world depends on who we are and what we share whether posting to social media, shopping online, or engaging a government service. Information about us as citizens or consumers range from our identity to hihgly-sensitive information about our identity, health, finances, and opinions. As social media and organizations ...

Read more

Introduction to GDPR

Our digital world depends on who we are and what we share whether posting to social media, shopping online, or engaging a government service. Information about us as citizens or consumers range from our identity to hihgly-sensitive information about our identity, health, finances, and opinions. As social media and organizations collect more personal data and the inevitable attacks by malefactors on these systems, we need to define rules on how organizations should protect this information ...

Read more

Introduction to GDPR


Digital Forensics

Lance Parlier covers the basics of what digital forensics is and why we need it. He provides examples of when digital forensics has been used successfully in the past, and how digital forensics can be used to determine what was compromised on a computer. He also touches on some digital ...

Read more

Digital Forensics

Lance Parlier covers the basics of what digital forensics is and why we need it. He provides examples of when digital forensics has been used successfully in the past, and how digital forensics can be used to determine what was compromised on a computer. He also touches on some digital forensic tools and methods of how to apply them.

Read more

Digital Forensics


Tiger: A Security Tool for UNIX Systems

Tiger is a set of scripts that scan a Unix system looking for security problems. It supports multiple UNIX platforms and is free to use. It can act as both a Host Intrusion Detection System and a Security Audit tool. Tiger compliments network IDS and kernel IDS. Tiger as a ...

Read more

Tiger is a set of scripts that scan a Unix system looking for security problems. It supports multiple UNIX platforms and is free to use. It can act as both a Host Intrusion Detection System and a Security Audit tool. Tiger compliments network IDS and kernel IDS. Tiger as a HIDS finds anything that slips past the NIDS.

As a HIDS, Tiger looks for suspicious processes, monitors host access, and monitors changes to critical system ...

Read more

Categories


Tags