Thursday, June 4, 2015

Security tools for linux

Anti-Virus

Essentially used to prevent, detect and remove malicious computer viruses. Most of them also work well against other types of malware: browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, among others.

1.AMaViS

2.AVG Free

3.ClamAV

4.Avast!

5.P3Scan

Anti-Malware

Essentially provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.

6.chkrootkit

7.Nixory

8.rkhunter

9.OSSEC

Encryption

Essentially a process of encoding messages or information in such a way that only authorised parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.

10.GnuPG

11.MCrypt

12.OpenSignature

13.PeaZip

14.Stunnel

15.MailCrypt

Intrusion Detection

Essentially monitors network or system activities for malicious activities or policy violations and produces reports to a management station.

16.AFICK

17.Bro

18.Kismet

19.Sguil

20.Snort

21.Tripwire

Firewalls

Essentially a network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted.

22.FireHOL

23.Firestarter

24.Netfilter

25.IPCop

26.Shorewall

27.Turtle Firewall

Network Monitoring

Essentially monitors a computer network for slow or failing components and notifies the network administrator (via email, SMS or other alarms) in case of outages.

28.Argus

29.Nagios

30.Nipper

31.ntop

32.SniffDet

33.tcpdump

Network Traffic Analyser

Essentially intercepts and examins messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted.

34.dsniff

35.ngrep

36.Ettercap

37.Wireshark

Packet Crafting

Essentially allows network administrators to probe firewall rule-sets and find entry points into a targeted system or network by manually generating packets to test network devices and behaviour.

38.Nemesis

39.Hping3

40.Scapy

41.Yersinia

Vulnerability Scanner

Essentially designed to assess computers, computer systems, networks or applications for weaknesses.

42.Nessus

43.SARA

44.Tiger

Log File Analysers

Essentially used to make sense out of computer-generated records (also called log or audit trail records).

45.AWStats

46.tcpreplay

47.The Webaliser

VPN Tools

Essentially enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network.

48.Poptop

49.SSL Explorer

50.OpenVPN

Source: Linux Links

Thursday, May 21, 2015

PDF tools : convert html to pdf on the fly

HTML To PDF Converter:

It's not a very easy job to extract content from a webpage if you are not using an appropriate tool. Most often you need to extract information directly from the Internet browser. Then this converter comes to help as it creates a PDF file of the required webpage for future usage. This tool is also useful for language applications.


PDFonFly:

This is a free online converter which takes the URL of a web page and converts it into a PDF file. Text can also be entered into WYSIWYG text field and then it's turned to a PDF file as well. At the bottom of every page, a two-line footer is generated too.
 

PDFCrowd:


This is a free online converter which takes a URL, an HTML file or even direct HTML input and convert them into a PDF file. Then the file is downloaded to your computer. It also adds a footer to each page with a logo and an advertisement. This tool allows customisation too.



Web2PDFConvert:

This is another online solution which installs a PDF convert button and it can make everything in a single click. It also has a unique feature which converts HTML via email by sending the recipient a webpage in a portable document format.



PDF2HTML Online:

It's known for its capability of extracting images into a separate directory. It can also write HTML4 and keep the hyperlinks which are present in the PDF file. It's an online tool which involves an easy conversion procedure too.


 

Monday, December 3, 2012

Windows 8 Licenses

Preinstalled licenses for Windows 8 use the new OA3.0, so I guess no COA sticker. I was thinking Windows 7 for some reason. I forgot what forum I was in for a second there.

The BIOS contains a hash that tells the Windows 8 installer that it is licensed for a specific version of Windows 8 (Windows 8 or Windows 8 Pro). If you install (or reinstall) that licensed version, it simply "activates" because the hardware is activated for that version of Windows. If you install a version of Windows 8 that the hardware isn't licensed for, it won't activate automatically and you'll have to put in a product key. 

The BIOS will have a SLIC table that is used for OEM-SLP activation. The big OEM's like Dell etc, add the custom SLIC table to their BIOS. The OEM installed OS looks for the SLIC table and if its found and matches a corresponding certificate file Activation is automatic. If it can't find the correct SLIC table activation fails. OEM-SLP does not activate online. If you create recovery media the OEM-SLP activation will be preserved for the PC its created on. You can't READ the OEM-SLP Product Code from the BIOS. Not without a utility anyway. You can use a utility like the Magical Jelly Bean Key Finder to retrieve it from the installed OS. Its not of any use though because OEM-SLP keys will not activate online. Every DELL model XYZ will have the same OEM-SLP product code and that code is blocked from online activation. That's why those PC's also have a COA sticker on them. If you have to you can install with a regular OEM DVD and use the Product code on the COA sticker. windows 7 uses OA 2.1. Windows 8 uses a new OA 3.0. With OA 3.0 each PC has a unique SLP product code that is embedded in its BIOS. One of the tricks used to pirate Windows was to add a SLIC table to a PC's BIOS so you could fake OEM-SLP activation. OA 3.0 is designed to prevent this and make it harder to pirate Windows. I'm sure there is more to it than that but the rest of it is a bit over my head. I would think there should still be a COA sticker on a Windows 8 machine though. How are you supposed to install the OS without the recovery disks? With OA 3.0 I would think the recovery media would only work on the PC it was created on. It would be unique to that PC not just to that make and model like it is now.

Tuesday, October 23, 2012

Office 2013 RTM at Build 15.0.4420.1017


Oct 22, 2012
My Digital Life Editorial Team

Office 2013 RTM at Build 15.0.4420.1017

Microsoft has announced that Office 2013, the most popular office productivity suite, has been released to manufacturing (RTM). It means that the development on Office 2013 has generally completed.
Windows RT users will probably get to use Office 2013 earlier than anyone else (unless of course you’re Microsoft insiders or there is a leak), as Windows RT devices will ship with the preview version of Office Home & Student 2013 RT from Windows 8 launch date, October 26th, 2012, but will be upgraded to full RTM version in early November. Office Home & Student 2013 RT includes the new Word, Excel, PowerPoint and OneNote applications for Windows RT devices.

Some business customers will get their hand on final build of Office 2013 earlier than others, as early as November 2012. According to Office News, Office 365 Enterprise customers will be using Office 2013 from the next service update starting in November through general availability. Volume Licensing customers with Software Assurance will be able to download the Office 2013 applications as well as other Office products including SharePoint 2013, Lync 2013 and Exchange 2013 through the Volume Licensing Service Center by mid-November, while IT professionals and developers will be able to download the final version via their TechNet or MSDN subscriptions by mid-November.
The general availability of Office 2013 is planned for the first quarter of 2013.
While Microsoft does not announce what’s the final build version for the Office 2013 RTM, some lucky folks have managed to download and install Office 2013 RTM. According to a Chinese blog, the build version for Office 2013 RTM is 15.0.4420.1017. The preview version of Office 2013 released by Microsoft has the build number of 15.0.4128.1014.
Office 2013 RTM
Comparing with Office 2010, Office 2013 has integrated Microsoft Lync 2013, which was previously a separate download, and Microsoft SkyDrive Pro, which allows business users to access, save and share files and documents through SharePoint. Essentially SkyDrive Pro is doing what SkyDrive does for home users, may be replacing SharePoint Workspace.
Office 2013 Applications
Related Posts:

Security and the Cloud


Security and the Cloud – Part 1


 This will be the first of a number of op-ed pieces on the security landscape of cloud computing. Security is often quoted as one of the main reason people back away from embracing the cloud. This I believe is often due to a combination of an over estimation of how secure their current arrangements are and a lack of knowledge about how secure the cloud CAN be. In this last regard the cloud is nothing special, like every other application, database or service its security is largely dependant on how it is used and configured and not its inherent capabilities.
As a step in gaining an understanding of the subject lets break the security landscape down into a number of arenas and look at how a classical on premise data centre, compares with an IaaS based cloud offering. This analysis can be extended to other scenarios but this is an informative example.
The physical arena, covers a direct attack on the equipment. If someone can actually walk up and touch the server then generally you have already lost. Encryption can help but that is very much a silver lining.
- Home Data Centre :- In a small regional facility with limited physical security as all the cost of security is borne by a single operator.
- Cloud IaaS:- Most likely state of the art security and a dedicated physical security team. Total cost of all security is borne across ALL the global clients of the provider.
Pipes’ arena, (apologies for the badly overused phrase), data and applications on a server are useless unless people can connect into them. This arena covers everything between the users device and the login screen.
- Home Data Centre:- Physical links into main offices, extremely secure provision of service to everyone at a desk. Mobile access has potentially been bolted on and is an increasingly overused tactical fix as the strategic solution is yet to be implemented.
- Cloud IaaS:- Mobile and Office users are in the same boat, you can’t have a tactical solution here and must expend the time and resources needed to create a fully secure   strategic solution.
This is where the CAN statement comes in, a Cloud based solution could be offer greater security than your home solution but only if it is build correctly.
Applications arena, this is a non score draw scenario as its the same applications in both locations. However this is an important arena as using other types of cloud solution such as SaaS and PaaS mean very different applications between the cloud and non cloud based services.
So I saved the best till last the users arena, again this is a no score draw between the two offerings as its the same users using the applications no matter where they are hosted. However it is worth thinking long and hard about how, where and on what users are working.
User arena security items are probably far bigger weak points then any other aspect of security in the modern environment. Sophisticated technology based attacks using zero day exploits make the news and are currently beating nation state security, but for everyone of these attacks there are hundreds based on social attacks on users. It doesn’t matter how complex and complete the lock is if someone can borrow a key.
A move to the cloud offers many benefits and can generally be made as secure as current on premise solutions. Focus should be spent on ensuring the your VPN, mobile and remote technology solutions are geared up to handle the increased traffic and are fully thought out strategic choices. However conversation on “how secure the cloud is” are great starting points to re-engage the business in the day to day activities and practices that make your data and applications stay secure independent of where they are delivered from.


Friday, August 3, 2012

Windows 8 RTM at Build 9200

Microsoft has officially announced that Windows 8 and its server version, Windows Server 2012, and the whole related ecosystem has been released to manufacturing (RTM), which indicated that the development of the OS has been completed, and the final code has already been handled to OEM partners for the purpose of preloading and preinstalling Windows 8 onto products sold to end-users.
The final build for Windows 8 RTM is build 9200, and build string is said to be version 6.2 and 9200.16384.win8_rtm.120725-1247, indicating the build was signed off on July 25th, 2012.

Windows Team blog published the schedule for Windows 8 release that specified who will be able to download Windows 8 at when.
  • August 15: MSDN and TechNet subscribers will be the first to get access to the new software.
  • August 16: Software Assurance customers and Microsoft Partner Network members will get access to the operating system.
  • August 20: Microsoft Action Pack providers will be given Windows 8.
  • September 1: Volume license customers not using Software Assurance will be able to purchase Windows 8 licenses.
  • October 26: Retail copies of Windows 8 and PCs and tablets (including Microsoft’s own Surface tablet) will go on sale.
Windows 8 RTM
The RTM of Windows 8 also signifies that Internet Explorer 10 (IE10) and Windows Store RTM is opened for business. However, a RTM build of Windows 8 is required to upload apps to the Store. Final build of Visual Studio 2012 will also be released on August 15th from MSDN.
Windows Server 2012, the so called Cloud OS, will available for everyone on September 4th, 2012.
Discuss the Windows 8 RTM milestone at the forum.
64-bit version of Windows 8 Enterprise N has leaked.
No related posts.