Arm assembler book as PDF

ARM assembler book by Peter Cockerell

Posted in Assembler,, Tutorials | Leave a comment


Posted from Diigo. The rest of my favorite links are here.

Posted in Uncategorized | Leave a comment

Network taps (sniffing)

Posted from Diigo. The rest of my favorite links are here.

Posted in Uncategorized | Leave a comment


    • LXC is great way to deploy applications. Let’s take a web stack like PHP, MySQL, Nginx and an app, you could install it in a VM but with a performance overhead.



      With a container you get near bare metal speeds and lower resource usage that allows you to scale efficiently.

    • LXD 0.19 release announcement    29th of September 2015 

    • Skipping Docker for LXC for Local Development

    • Traditional hypervisors allow the environment to be secured directly by the server hardware. Such features keep the VM isolated from other things that are running on the system. Canonical’s hypervisor Openstack has Docker support through the nova Docker driver.

    • The focus of LXD is on system containers. That is, a container which runs a clean copy of a Linux distribution or a full appliance. From a design perspective, LXD doesn’t care about what’s running in the container.

    • The simplest way for somebody to try LXD is by using it with its command line tool. This can easily be done on your laptop or desktop machine.


      On an Ubuntu 15.04 system (or by using ppa:ubuntu-lxc/lxd-stable on 14.04 or above), you can install LXD with:


      sudo apt-get install lxd

Posted from Diigo. The rest of my favorite links are here.

Posted in Uncategorized | Leave a comment

Tiger – UNIX Security Checker

  • " tripwire_run"

    tags: tripwire

    • behaviour of Tiger and how it can be used to setup a host-based  intrusion detection system

    • Automatically checking for security issues with debsecan


       The debsecan program evaluates the security status of by reporting both missing security updates and security vulnerabilities.

    • There are other, simpler tools that can be used to detect network attacks. portsentry

    • You can test any of these tools with the Debian package idswakeup, a shell script which generates false alarms, and includes many common attack signatures. 

    • Debian since the Woody branch. tiger provides checks of common issues related to security break-ins, like password strength, file system problems, communicating processes, and other ways root might be compromised. This package includes new Debian-specific security checks including: MD5sums checks of installed files, locations of files not belonging to packages, and analysis of local listening processes. The default installation sets up tiger to run each day, generating a report that is sent to the superuser about possible compromises of the system.

    • Loadable kernel modules are files containing dynamically loadable kernel components used to expand the functionality of the kernel. The main benefit of using modules is the ability to add additional devices, like an Ethernet or sound card, without patching the kernel source and recompiling the entire kernel. However, crackers are now using LKMs for root-kits (knark and adore), opening up back doors in GNU/Linux systems.

    • One such strategy is getting there first, that is, loading an LKM designed to protect the system from other malicious LKMs.

    • Debian’s TIGER incorporates new checks primarily oriented towards Debian distribution including: md5sums checks of installed files, location of files not belonging to packages, check of security advisories and analysis of local listening processes.

    • Using tiger for security audit and intrusion detection!

    • The Unix security audit and intrusion detection tool

    • Free software Linux/*BSD distributions have a myriad of security tools to do local security checks: Debian’s checksecurity,

Posted from Diigo. The rest of my favorite links are here.

Posted in Uncategorized | Leave a comment


    • OSSEC
      Apart from its role as an intrusion detection system, host-based OSSEC is often used as a security information and event manager (SEM/SIM)
    • Snort
      Using protocol analysis, content searching and different pre-processors, Snort is able to detect thousands of worms, vulnerability exploit attempts, port scans and other suspicious behavior. This NIDS is perfect for traffic analysis and packet logging on IP networks.
    • This network security analysis tool uses Network Security Monitoring (NSM) a concept developed by Richard Bejtlich, Director of Incident Response at General Electric,
    • In an ideal scenario, a corporate network should be shielded by both a HID and NID systems. The former acts as a last ditch protection for individual computers, while the latter maintains the secure network.

Stealthful Sniffing, Intrusion Detection and Logging:,0

Intrusion Detection Systems
with Snort
Advanced IDS Techniques Using
Snort, Apache, MySQL, PHP, and ACID:-

Using Snort – Debian guide’snort’_Intrusion_Detection_System

The Snort Blog – guis for snort

Posted in Intrusion detection | Tagged | Leave a comment

A tmux Primer

A tmux Primer

Posted in Uncategorized | Leave a comment

Interview with Jonathan Boulle of Rocket

Interview with Jonathan Boulle of Rocket |

Posted in Uncategorized | Leave a comment

Zentyal Server Community Edition http://

Zentyal Server Community Edition

Posted in Uncategorized | Leave a comment

An Introduction to Programming in Go htt

An Introduction to Programming in Go

Posted in Uncategorized | Leave a comment