Archive | Security Software


26 May 2006 | 7,362 views

Serious Symantec Anti-Virus Vulnerability

Apparently a gaping security flaw in the latest versions of Symantec’s anti-virus software suite has been discovered that could put millions of users at risk of a debilitating worm attack. According to eEye Digital Security, the company that discovered the flaw, the vulnerability could be exploited by remote hackers to take complete control of the [...]

Continue Reading


17 May 2006 | 5,306 views

Source Code & Software Security Analysis with BogoSec

Bogosec is essentially a tool for finding security vulnerabilities in source code. BogoSec aims to increase awareness regarding code security vulnerabilities, while encouraging developers to produce more secure code over time. By simplifying the code scanning process, BogoSec achieves a goal of allowing developers to scan their code regularly and more effectively. BogoSec is a [...]

Continue Reading


15 May 2006 | 7,636 views

OSSEC HIDS – Open Source Host-based Intrusion System

OSSEC HIDS is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Solaris and Windows. This is the first version offering native support for Windows (XP/2000/2003). It includes as well a new set of [...]

Continue Reading


10 May 2006 | 25,045 views

SecureDVD – Multiboot Live Security Distro’s

SecureDVD is a DVD with the 10 Best Security related Live CD’s. Yes that’s right, they authored this DVD based on the recommendations made by Darknet! Now you can have all your favorite CDs ‘compiled’ into a single DVD. I love this idea. SecureDVD is available to download, but due to it’s size, only in [...]

Continue Reading


17 April 2006 | 1,857,955 views

Top 15 Security/Hacking Tools & Utilities

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to [...]

Continue Reading


04 April 2006 | 6,971 views

Google Safe Browsing Extension for Firefox & Netcraft Toolbar – Anti-Phishing

I remember some time back Netcraft developed an anti-phishing toolbar for Internet Explorer Exploder and Firefox. You can check it out here: Netcraft Toolbar Protect your savings from Phishing attacks. See the hosting location and Risk Rating of every site you visit. Help defend the Internet community from fraudsters. Then recently Google has come out [...]

Continue Reading


30 March 2006 | 5,091 views

US Investigates Snort Sale as a Security Risk

Basically the Americans are saying a lot of their sensitive govermental organisations are using Snort and they don’t want the software to be controlled by an Israeli company, they see it as a threat. The same Bush administration review panel that approved a ports deal involving the United Arab Emirates has notified a leading Israeli [...]

Continue Reading


14 March 2006 | 1,133,827 views

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying [...]

Continue Reading


10 March 2006 | 22,776 views

SSL VPNs and OpenVPN – Part IV

4. Brief How-to …. Creating Multiple clients to Single site tunnels. Example of using PKI to create a client-to-site VPN: For a road warrior or roaming/multiple user scenario, static keys based VPNs don’t scale well. You will need to implement a PKI if you have Hub and Spoke architecture of VPN. From the OpenVPN.net website: [...]

Continue Reading


09 March 2006 | 21,409 views

SSL VPNs and OpenVPN – Part III

3. Brief How-to ….. OpenVPN and Site-to-Site Tunnels. OpenVPN can be implemented either Site-to-site or client-server model. I will take example configurations of both models. If you want to implement site-to-site configuration, the best way is to use static-keys instead of PKI. Using static keys, you can have your VPN tunnel up and running in [...]

Continue Reading